CN106537378A - Method of redirecting search queries from an untrusted search engine to a trusted search engine - Google Patents
Method of redirecting search queries from an untrusted search engine to a trusted search engine Download PDFInfo
- Publication number
- CN106537378A CN106537378A CN201580016151.9A CN201580016151A CN106537378A CN 106537378 A CN106537378 A CN 106537378A CN 201580016151 A CN201580016151 A CN 201580016151A CN 106537378 A CN106537378 A CN 106537378A
- Authority
- CN
- China
- Prior art keywords
- search
- search engine
- url
- request
- engine
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 28
- 238000012546 transfer Methods 0.000 claims description 3
- 238000012544 monitoring process Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000009825 accumulation Methods 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 201000010099 disease Diseases 0.000 description 1
- 208000037265 diseases, disorders, signs and symptoms Diseases 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Abstract
A method of redirecting search queries from an untrusted search engine to a trusted search engine is a software application that is used to prevent personal information from being collected by untrusted search engines. The software application receives a search query URL for a desired search engine which corresponds to a search query. The search query is compared to a provided plurality of untrusted URL patterns in order to determine if the desired search engine can be trusted. If the search query URL is not found on in the plurality of untrusted URL patterns, the search is allowed to proceed. If the search query URL is found in the plurality of untrusted URL patterns, the search query is redirected to a trusted search engine. At least one trusted URL pattern is provided so that the search can be redirected to a trusted search engine.
Description
The application be PCT application and require that on 05 29th, 2015 submit to U.S.'s non-provisional application 14/725,
593 used as priority.U.S.'s non-provisional application 14/725,593 require that the interim Shen in the U.S. submitted on 05 30th, 2014
Please be 62/005,739 as priority.
Technical field
The present disclosure generally relates to Web search request, the request is manufactured in a user computer, and is sent to outside one and is taken
Business device, the external server receive and meet the search to ask.More particularly, the present invention is related to one kind will search request from distrust
Search engine be oriented to trust Search engine method.The present invention is designed to the " Hyper-Text Transfer Protocol for monitoring unofficial biography
(HTTP) " ask, and using " URL(Uniform Resource Locator) (URLs) " judging whether unofficial biography " HTTP " request is directed to and is considered as
Unsafe Search engine or other network address.If unofficial biography " HTTP " request be directed to be considered as unsafe Search engine or its
Its network address, this unofficial biography request can be re-directed to be considered as safe Search engine by this communications protocol.
Background technology
The user of network often calls on the website that some can collect record resource-user cost method.Collect and use in these websites
The reason for person's information, includes, but are not limited to:Improve user experience, produce report, carry out the analysis of user speciality and lifted
Business revenue.These user information are usually utilized to carry out targetedly advertisement, are sold to other companies, or divide with other companies
Enjoy.Via the user information that Search engine is collected, it is probably very valuable to a company, can be used to lift company
Business revenue.As Search engine usually may require that request is searched in user input, and these are searched request and can usually show use
Particular interest of the person to some themes.So what the information for capturing from Search engine and coming generally was obtained compared with other places of automatic network
Information is come more useful.But the generally unusual secret of these themes, if other people learn the particular interest of user
If, the reputation and social relations of user may be injured.So Search engine and other websites are collected and record these information,
The user of network can be allowed very unhappy, there may be some people spy on their information because they do not like very much.
One of most sensitive network user information is the historical record of user search activity.When a network user makes
During with Search engine search for networks, his network (IP) address and other information can be recorded together with his search request,
And these network address and other information may can be used to recognize the personal identification of user.Accumulation over time, searches
Engine dealer can by the historical record for inspecting user search, and learn the personal question of user, unmentionable disease, desire and
Other sensitive personal information.This exactly many network user does not like Search engine collection and records his search record very much
The reason for.Equally allow user it is deeply concerned be:These search records may be used for carrying out by other websites it is targetedly wide
Accuse and disturbed again, or their search record can be sold to other companies, or share with other companies.For
The reason for advertisement of property can allow user to perplex be:They may be seen in other website, especially have other people just temporary
When ground using his computer when.
It will be clear that a kind of software of needs, for protecting the user of Search engine, avoid notifying collection and remember
The Search engine of historical record is searched in record.This kind of software can improve the right of privacy of the user on network, and help user
Protection can be used to the information and other data for recognizing individual.An object of the present invention is to help user to protect their networks
The pattern of search and the historical record of search avoid being collected and record.The present invention is installed on user computer by providing one
Software, the HTTP request of the monitoring unofficial biography of active, and reach this purpose.The request of the software analysis HTTP of the present invention, with
Judge whether this HTTP request is just being directed to one and is notifying the Search engine for collecting record user information.If it is determined that
HTTP request is just being directed to one of Search engine of that class, and the software of the present invention automatically can react, by HTTP request again
It is oriented to a Search engine that will not be collected and record user information.The present invention can maintain that those are abandoned or compromise user is hidden
The list of the Search engine and URLs of private rights, and this list is updated from external server, while this list is contained in
Among software.Thereby, software of the invention just can suitably do decision-making, and it is identical that HTTP request is re-directed to One function
And the URL of the user right of privacy of will not compromising.
Description of the drawings
Fig. 1 is the general procedure of the method for the flow chart description present invention.
Fig. 2 is a first embodiment of the workflow diagram description present invention.
Fig. 3 is a second embodiment of the workflow diagram description present invention.
Fig. 4 is the step of flow chart description present invention updates plural fly-by-night URL kenels.
Fig. 5 is the step of flow chart description present invention updates at least one URL kenels trusty.
Fig. 6 is the step of flow chart description present invention permits one to be permitted the search result that predetermined Search engine is produced.
Fig. 7 is that the flow chart description present invention searches the step of being oriented to the fruit of a Search engine trusted by one.
Fig. 8 is the step that flow chart description present invention decryption encryption HTTP is asked.
Specific embodiment
The appended diagram of this specification is only for the embodiment version for illustrating some selections, is not intended to limit the present invention
Scope.
Refer to Fig. 1 to Fig. 3.The present invention is that a kind of will search asks to be oriented to searching for trust from mistrustful Search engine
The method for seeking engine.The present invention is by the computer executable instructions for performing the non-momentary computer-readable media being stored in
The method of the present invention of enforcement.Many Search engines help user to look for some websites, but it is defeated also to store user simultaneously
The information of the search request for entering.These information can be searched engine company for setting up the personal data of specific user, especially
Which is that network (IP) address sent by this information can be searched engine company and be known.For the user of many networks
This kind of phenomenon constitute allow people worry the compromised situation of the right of privacy, and the present invention is exactly used for resisting this right of privacy
Threaten.The present invention is detected the whether just online meeting of user and collects searching for personal information comprising using a kind of system and method
Engine is sought, if original Search engine is found to be fly-by-night, the search of user request can be oriented to one by the present invention
The individual Search engine that can be trusted.
The system of the present invention is built upon one for carrying out the user computing device of Web search searching engine, for example:
Desktop PC, laptop computer, tablet PC or intelligent mobile phone.In an embodiment, user computing device
It is responsible for monitoring and is re-directed to the Web search of user.In another embodiment, the present invention provides an intermediary server to be used to supervise
Control and be re-directed to the Web search started by user computing device.This intermediary server is by network connection user meter
Device is calculated, is planned to intercept Hyper-Text Transfer Protocol (HTTP) search request, and be can determine whether that this HTTP searches request and is
No attempt connects to fly-by-night Search engine.In an embodiment, this intermediary server can be used in the HTTP of encryption
(HTTPS) search request.The inventive method provides at least one URL(Uniform Resource Locator) (URL) kenel trusty first, and multiple
The fly-by-night URL kenels (step A) of number.Fly-by-night URL(Uniform Resource Locator) kenel is stored in a form, its definition
The kenel of various URLs unsafe to user privacy.At least one URL kenels trusty are for by unsafe Web search
It is re-directed to Search engine trusty.This little at least one URL kenel trusty and plural fly-by-night URL kenels are
In a manual fashion or the mode of sequencing is stored in user computing device, and with extendability indicating language (XML),
JavaScript Object Notation (JSON) files or other computer-readable formats are presented.At least one trusted
URL kenels and plural fly-by-night URL types both of which can include wild-character, and cover URLs partially or in whole.Wildcard
Character can be such that character string or kenel is added in single kenel, and whether a search is asked to enable the more flexible identification of each kenel
URL is asked to be derived from a fly-by-night Search engine.In an embodiment, the method for the present invention provides one and updates server, uses
In update an at least trusted URL and plural trustless URL, this when new fly-by-night Search engine is found very
It is useful.
Refer to Fig. 1.The method of the present invention is a kind of application software, and which includes computer executable instructions, with a monitoring
The search that user is performed, and be re-directed to be considered as unsafe search.When the online predetermined Search engine of user simultaneously
When starting a Web search, this application software receives a search request URL of this predetermined Search engine, wherein this search
Request URL system is corresponding to this search request (step B).This reservation Search engine is exactly that user is wanted net is completed above
The Search engine that network is searched.This reservation Search engine can be safe or unsafe Search engine.It is one pre- in order to determine this
Determine whether Search engine is to be trusted, this search request URL is compared with plural fly-by-night URL kenels, to find out this
Whether one reservation Search engine is in fly-by-night URL kenels (step C).If this reservation Search engine is simultaneously undiscovered
In plural fly-by-night URL kenels, then this can complete to search request from request URL is searched once predetermined Search engine,
And produce search result (step D).If this reservation Search engine is found in plural fly-by-night URL kenels,
This application software will be searched request and be redirected into a Search engine (step trusty according to URL kenels trusty
E).Trusted receive seek engine be one relative to an at least trusted URL kenels, and be considered as safe Search engine.
Various embodiments of the present invention have one or more Search engines.Ask to carry out in website trusty by allowing search, or mat
By being re-directed to attempt to ask in the search of fly-by-night website search, present invention can ensure that the privacy of user personal information
Power.
As described above, in certain embodiments, the present invention updates plural fly-by-night URL using server timing is updated
Kenel.Refer to Fig. 2 to Fig. 4.When the system of the present invention is comprising server is updated, this application software periodically can be required more
New demand servicing device carries out the renewal of trustless kenel.The renewal of trustless kenel includes producing and edits:Kenel, URLs, company
The information of knot, configuration file, icon and other various kenels.If renewal can be implemented, this application software self refresh is serviced
Device obtains the renewal of trustless kenel, and the then renewal of trustless kenel is just merged in plural trustless URL kenels.
The method of the present invention, allows fly-by-night Search engine, can be identified out when needed.Meanwhile, the method for the present invention is being distinguished
During recognizing fly-by-night Search engine, constantly can become more efficiently.
Refer to Fig. 2, Fig. 3, and Fig. 5.Just as to, plural fly-by-night URL kenels, updating server can also
It is changed for URL kenels trusty at least.It is that, up to this purpose, this application software may require that renewal server is fixed
When carry out the renewal of trusted kenel.The renewal of trusted kenel includes producing and edits:Kenel, URLs, link, configuration shelves
The information of case, icon and other various kenels.If renewal can be implemented, this application software self refresh server is obtained can
Trust the renewal of kenel, the then renewal of trusted kenel is just merged in an at least trusted URL kenels.The side of the present invention
Method, makes Web search be guided exactly and leaves fly-by-night Search engine.Meanwhile, the method for the present invention is by being updated to
Few trusted URL kenels, and allow being used of most Search engines trusty.
Refer to Fig. 6.After application software compares search request URL and plural fly-by-night URLs, if predetermined
Search engine do not find that among the fly-by-night URL kenels of plural number the search of user request can be without barrier
Carry out in predetermined Search engine.It is that application software allows to search asks to be sent to predetermined Search engine up to this purpose.
After predetermined Search engine produces the result searched, this application software receives the result of this search, then hands over this search result
Pay user computing device.
Refer to Fig. 7.Among if predetermined Search engine is found in the fly-by-night URL kenels of plural number, this
This search is re-directed to Search engine trusty by one application software.It is that, up to this purpose, this application software please from search
This search request is extracted in seeking URL, and this search request is sent to into Search engine trusty.Then this application
Software obtains search result from Search engine trusty, then this search result payment is given user computing device.Due to making
The search request of user before with predetermined Search engine contact, be just redirected to will not collect personal information can
The Search engine of trust, predetermined Search engine can't obtain the personal information of user.
The System and method for of the present invention mainly has two embodiments.In one embodiment, step A to step E all by
User computing device is individually carried out.In the first embodiment, application software is only installed at user computing device.First implements
Example is relatively adapted for use with the device of high operational capability, for example:Desktop PC, laptop computer or other similar dresses
Put.In the first embodiment, this application software can be:Insert type web browser, browser extend software, self reliance type net
Network browser or any similar application software for linking ability with network, including non-browser software.In second embodiment
In, this one with software using intermediary server execution step A to step E, but some application softwaries and network on-line are with confidence
Breath then needs user computing device and intermediary server jointlessly to contact.In a second embodiment, searching produced by step E
Seek result and be sent to user computing device.Second embodiment is relatively adapted to be used in relatively low operational capability and the online energy of finite element network
The computing device of power, for example:Intelligent mobile phone or tablet PC.Any configuration information for being installed on user computing device is soft
Part can also regard intermediary server, to translate from user computing device the encryption information for sending out.Then, step A
Can also include:Encryption HTTP (HTTPs) request related to request URL is searched is received, as shown in Figure 8.Then, this application
Software can decrypt HTTPs requests, and each that then will search request URL and plural trustless URL kenels compares.
Although the present invention is illustrated as above with embodiment, but those are implemented routine and are only for illustrating the present invention, not
For limiting the scope of the present invention.Here has usually intellectual in one field, according to carried out by disclosed content
Various equivalent modifications and change, do not depart from the spirit of the present invention, and are contained in the interest field of the present invention.
Claims (8)
1. a kind of will to search the method that request is oriented to the Search engine trusted from mistrustful Search engine, which is by performing storage
Implement in the computer executable instructions of a non-momentary computer-readable media, and include:
Step (A):At least one URL(Uniform Resource Locator) (URL) kenel trusty, and plural fly-by-night URL types are provided
State;
Step (B):A search request URL of a predetermined Search engine is received, the wherein search request URL system is searched corresponding to one
Request;
Step (C):Relatively the search request URL and each plural fly-by-night URL kenels, are drawn with finding out the reservation search
Hold up whether in the plural fly-by-night URL kenels;
Step (D):If the reservation Search engine is not found in the plural fly-by-night URL kenels, this makes a reservation for
Search engine just can complete to search request from the search request URL, and produce search result;And
Step (E):If the reservation Search engine is found in the plural fly-by-night URL types kenel, according to this extremely
The search request is redirected into a Search engine trusty by few URL kenels trusty.
2. the method that will search as described in claims 1 asks the Search engine from mistrustful Search engine guiding trust, its
The computer executable instructions that a non-momentary computer-readable media is stored in by execution are implemented, and further include:
There is provided one and update server;
Periodically require that the renewal server carries out the renewal of trustless kenel;
The renewal of trustless kenel is obtained from the renewal server;And
The renewal of trustless kenel is incorporated in the plural fly-by-night URL kenels.
3. the method that will search as described in claims 1 asks the Search engine from mistrustful Search engine guiding trust, its
The computer executable instructions that a non-momentary computer-readable media is stored in by execution are implemented, and further include:
There is provided one and update server;
Periodically require that the renewal server carries out the renewal of trusted kenel;
The renewal of the trusted kenel is obtained from the renewal server;And
The renewal of the trusted kenel is incorporated at least one URL kenels trusty.
4. the method that will search as described in claims 1 asks the Search engine from mistrustful Search engine guiding trust, its
The computer executable instructions that a non-momentary computer-readable media is stored in by execution are implemented, if wherein the reservation is searched
Engine is not found in the plural fly-by-night URL kenels, then the method is further included:
The search request is allowed to be transferred into the predetermined Search engine;
Receive the search result that the predetermined Search engine is produced;And
Pay the search result and give a user computing device.
5. the method that will search as described in claims 1 asks the Search engine from mistrustful Search engine guiding trust, its
The computer executable instructions that a non-momentary computer-readable media is stored in by execution are implemented, if wherein the reservation is searched
Engine is found in the plural fly-by-night URL kenels, then the method is further included:
The search is extracted from the search request URL to ask;
The search request is sent to into a Search engine trusty;
Search result trusty is obtained from the Search engine trusty;And
Pay the search result and give a user computing device.
6. the method that will search as described in claims 1 asks the Search engine from mistrustful Search engine guiding trust, its
The computer executable instructions that a non-momentary computer-readable media is stored in by execution are implemented, and wherein the step (A) extremely should
Step (E) is performed by a user computing device.
7. the method that will search as described in claims 1 asks the Search engine from mistrustful Search engine guiding trust, its
The computer executable instructions that a non-momentary computer-readable media is stored in by execution are implemented, wherein an intermediary server is held
The row step (A) to the step (E);The search result produced by the step (E) is sent to a user computing device.
8. the method that will search as described in claims 1 asks the Search engine from mistrustful Search engine guiding trust, its
The computer executable instructions that a non-momentary computer-readable media is stored in by execution are implemented, and further include:
Receive encryption Hyper-Text Transfer Protocol (HTTP) request related to the search request URL;And
The encryption HTTP request is decrypted, then by each phase of the search request URL and the plural fly-by-night URL kenels
Relatively.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201462005739P | 2014-05-30 | 2014-05-30 | |
US62/005,739 | 2014-05-30 | ||
PCT/US2015/033384 WO2015184392A2 (en) | 2014-05-30 | 2015-05-29 | Method of redirecting search queries from an untrusted search engine to a trusted search engine |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106537378A true CN106537378A (en) | 2017-03-22 |
Family
ID=56132524
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201580016151.9A Pending CN106537378A (en) | 2014-05-30 | 2015-05-29 | Method of redirecting search queries from an untrusted search engine to a trusted search engine |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP3047405A4 (en) |
CN (1) | CN106537378A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040078224A1 (en) * | 2002-03-18 | 2004-04-22 | Merck & Co., Inc. | Computer assisted and/or implemented process and system for searching and producing source-specific sets of search results and a site search summary box |
US20090112805A1 (en) * | 2007-10-31 | 2009-04-30 | Zachary Adam Garbow | Method, system, and computer program product for implementing search query privacy |
CN102073822A (en) * | 2011-01-30 | 2011-05-25 | 北京搜狗科技发展有限公司 | Method and system for preventing user information from leaking |
CN102737119A (en) * | 2012-05-30 | 2012-10-17 | 华为技术有限公司 | Searching method, filtering method and related equipment and systems of uniform resource locator |
CN102930211A (en) * | 2012-11-07 | 2013-02-13 | 北京奇虎科技有限公司 | Method for intercepting malicious URLs in multi-kernel browser and multi-kernel browser |
US20140026221A1 (en) * | 2012-07-17 | 2014-01-23 | Oracle International Corporation | Defense against search engine tracking |
-
2015
- 2015-05-29 EP EP15799232.2A patent/EP3047405A4/en not_active Withdrawn
- 2015-05-29 CN CN201580016151.9A patent/CN106537378A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040078224A1 (en) * | 2002-03-18 | 2004-04-22 | Merck & Co., Inc. | Computer assisted and/or implemented process and system for searching and producing source-specific sets of search results and a site search summary box |
US20090112805A1 (en) * | 2007-10-31 | 2009-04-30 | Zachary Adam Garbow | Method, system, and computer program product for implementing search query privacy |
CN102073822A (en) * | 2011-01-30 | 2011-05-25 | 北京搜狗科技发展有限公司 | Method and system for preventing user information from leaking |
CN102737119A (en) * | 2012-05-30 | 2012-10-17 | 华为技术有限公司 | Searching method, filtering method and related equipment and systems of uniform resource locator |
US20140026221A1 (en) * | 2012-07-17 | 2014-01-23 | Oracle International Corporation | Defense against search engine tracking |
CN102930211A (en) * | 2012-11-07 | 2013-02-13 | 北京奇虎科技有限公司 | Method for intercepting malicious URLs in multi-kernel browser and multi-kernel browser |
Non-Patent Citations (1)
Title |
---|
K9WEBPROTECTION: "Enforcing K9 Safe Search", 《HTTP://WEB.ARCHIVE.ORG/WEB/20130129000652/HTTP://WWW1.K9WEBPROTECTION.COM/SUPPORT/ENFORCE-K9-SAFE-SEARCH》 * |
Also Published As
Publication number | Publication date |
---|---|
EP3047405A2 (en) | 2016-07-27 |
EP3047405A4 (en) | 2017-07-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11711438B2 (en) | Systems and methods for controlling data exposure using artificial-intelligence-based periodic modeling | |
US11916944B2 (en) | Network anomaly detection and profiling | |
CN105210042B (en) | Internet protocol threatens protection | |
Eterovic-Soric et al. | Stalking the stalkers–detecting and deterring stalking behaviours using technology: A review | |
Zulkarnine et al. | Surfacing collaborated networks in dark web to find illicit and criminal content | |
Bonneau et al. | Prying data out of a social network | |
CN101971591B (en) | System and method of analyzing web addresses | |
CN105100034B (en) | The method and apparatus of access function in a kind of network application | |
CN105100032B (en) | A kind of method and device for preventing resource from stealing | |
CN104579773B (en) | Domain name system analyzes method and device | |
CN105939326A (en) | Message processing method and device | |
CN103853841A (en) | Method for analyzing abnormal behavior of user in social networking site | |
CA3098702A1 (en) | Systems and methods for controlling data exposure using artificial-intelligence-based modeling | |
CN107911282A (en) | A kind of network system that third-party application implantation is realized towards social networks | |
Huh | Implementation of lightweight intrusion detection model for security of smart green house and vertical farm | |
JP6576932B2 (en) | How to redirect search requests from an untrusted search engine to a trusted search engine | |
Choi et al. | Enhanced SDIoT security framework models | |
Van Haaster et al. | Cyber guerilla | |
He et al. | Mobile app identification for encrypted network flows by traffic correlation | |
Korać et al. | A hybrid XSS attack (HYXSSA) based on fusion approach: Challenges, threats and implications in cybersecurity | |
Klint | Cybersecurity in home-office environments: An examination of security best practices post Covid | |
CN106537378A (en) | Method of redirecting search queries from an untrusted search engine to a trusted search engine | |
Lazarenko et al. | Anonymity of tor: Myth and reality | |
Bolton et al. | Privextractor: Toward redressing the imbalance of understanding between virtual assistant users and vendors | |
Rosengren | Contribution of Open-Source Intelligence to Social Engineering Cyberattacks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1230302 Country of ref document: HK |
|
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170322 |
|
RJ01 | Rejection of invention patent application after publication | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: WD Ref document number: 1230302 Country of ref document: HK |