CN106537378A - Method of redirecting search queries from an untrusted search engine to a trusted search engine - Google Patents

Method of redirecting search queries from an untrusted search engine to a trusted search engine Download PDF

Info

Publication number
CN106537378A
CN106537378A CN201580016151.9A CN201580016151A CN106537378A CN 106537378 A CN106537378 A CN 106537378A CN 201580016151 A CN201580016151 A CN 201580016151A CN 106537378 A CN106537378 A CN 106537378A
Authority
CN
China
Prior art keywords
search
search engine
url
request
engine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201580016151.9A
Other languages
Chinese (zh)
Inventor
亚伦·F·拉芙蕾丝
塞伦·S·汤普森
史蒂文·M·马克维茨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Pro & Co Ltd
Original Assignee
Pro & Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Pro & Co Ltd filed Critical Pro & Co Ltd
Priority claimed from PCT/US2015/033384 external-priority patent/WO2015184392A2/en
Publication of CN106537378A publication Critical patent/CN106537378A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Abstract

A method of redirecting search queries from an untrusted search engine to a trusted search engine is a software application that is used to prevent personal information from being collected by untrusted search engines. The software application receives a search query URL for a desired search engine which corresponds to a search query. The search query is compared to a provided plurality of untrusted URL patterns in order to determine if the desired search engine can be trusted. If the search query URL is not found on in the plurality of untrusted URL patterns, the search is allowed to proceed. If the search query URL is found in the plurality of untrusted URL patterns, the search query is redirected to a trusted search engine. At least one trusted URL pattern is provided so that the search can be redirected to a trusted search engine.

Description

The method that request is oriented to the Search engine trusted from mistrustful Search engine will be searched
The application be PCT application and require that on 05 29th, 2015 submit to U.S.'s non-provisional application 14/725, 593 used as priority.U.S.'s non-provisional application 14/725,593 require that the interim Shen in the U.S. submitted on 05 30th, 2014 Please be 62/005,739 as priority.
Technical field
The present disclosure generally relates to Web search request, the request is manufactured in a user computer, and is sent to outside one and is taken Business device, the external server receive and meet the search to ask.More particularly, the present invention is related to one kind will search request from distrust Search engine be oriented to trust Search engine method.The present invention is designed to the " Hyper-Text Transfer Protocol for monitoring unofficial biography (HTTP) " ask, and using " URL(Uniform Resource Locator) (URLs) " judging whether unofficial biography " HTTP " request is directed to and is considered as Unsafe Search engine or other network address.If unofficial biography " HTTP " request be directed to be considered as unsafe Search engine or its Its network address, this unofficial biography request can be re-directed to be considered as safe Search engine by this communications protocol.
Background technology
The user of network often calls on the website that some can collect record resource-user cost method.Collect and use in these websites The reason for person's information, includes, but are not limited to:Improve user experience, produce report, carry out the analysis of user speciality and lifted Business revenue.These user information are usually utilized to carry out targetedly advertisement, are sold to other companies, or divide with other companies Enjoy.Via the user information that Search engine is collected, it is probably very valuable to a company, can be used to lift company Business revenue.As Search engine usually may require that request is searched in user input, and these are searched request and can usually show use Particular interest of the person to some themes.So what the information for capturing from Search engine and coming generally was obtained compared with other places of automatic network Information is come more useful.But the generally unusual secret of these themes, if other people learn the particular interest of user If, the reputation and social relations of user may be injured.So Search engine and other websites are collected and record these information, The user of network can be allowed very unhappy, there may be some people spy on their information because they do not like very much.
One of most sensitive network user information is the historical record of user search activity.When a network user makes During with Search engine search for networks, his network (IP) address and other information can be recorded together with his search request, And these network address and other information may can be used to recognize the personal identification of user.Accumulation over time, searches Engine dealer can by the historical record for inspecting user search, and learn the personal question of user, unmentionable disease, desire and Other sensitive personal information.This exactly many network user does not like Search engine collection and records his search record very much The reason for.Equally allow user it is deeply concerned be:These search records may be used for carrying out by other websites it is targetedly wide Accuse and disturbed again, or their search record can be sold to other companies, or share with other companies.For The reason for advertisement of property can allow user to perplex be:They may be seen in other website, especially have other people just temporary When ground using his computer when.
It will be clear that a kind of software of needs, for protecting the user of Search engine, avoid notifying collection and remember The Search engine of historical record is searched in record.This kind of software can improve the right of privacy of the user on network, and help user Protection can be used to the information and other data for recognizing individual.An object of the present invention is to help user to protect their networks The pattern of search and the historical record of search avoid being collected and record.The present invention is installed on user computer by providing one Software, the HTTP request of the monitoring unofficial biography of active, and reach this purpose.The request of the software analysis HTTP of the present invention, with Judge whether this HTTP request is just being directed to one and is notifying the Search engine for collecting record user information.If it is determined that HTTP request is just being directed to one of Search engine of that class, and the software of the present invention automatically can react, by HTTP request again It is oriented to a Search engine that will not be collected and record user information.The present invention can maintain that those are abandoned or compromise user is hidden The list of the Search engine and URLs of private rights, and this list is updated from external server, while this list is contained in Among software.Thereby, software of the invention just can suitably do decision-making, and it is identical that HTTP request is re-directed to One function And the URL of the user right of privacy of will not compromising.
Description of the drawings
Fig. 1 is the general procedure of the method for the flow chart description present invention.
Fig. 2 is a first embodiment of the workflow diagram description present invention.
Fig. 3 is a second embodiment of the workflow diagram description present invention.
Fig. 4 is the step of flow chart description present invention updates plural fly-by-night URL kenels.
Fig. 5 is the step of flow chart description present invention updates at least one URL kenels trusty.
Fig. 6 is the step of flow chart description present invention permits one to be permitted the search result that predetermined Search engine is produced.
Fig. 7 is that the flow chart description present invention searches the step of being oriented to the fruit of a Search engine trusted by one.
Fig. 8 is the step that flow chart description present invention decryption encryption HTTP is asked.
Specific embodiment
The appended diagram of this specification is only for the embodiment version for illustrating some selections, is not intended to limit the present invention Scope.
Refer to Fig. 1 to Fig. 3.The present invention is that a kind of will search asks to be oriented to searching for trust from mistrustful Search engine The method for seeking engine.The present invention is by the computer executable instructions for performing the non-momentary computer-readable media being stored in The method of the present invention of enforcement.Many Search engines help user to look for some websites, but it is defeated also to store user simultaneously The information of the search request for entering.These information can be searched engine company for setting up the personal data of specific user, especially Which is that network (IP) address sent by this information can be searched engine company and be known.For the user of many networks This kind of phenomenon constitute allow people worry the compromised situation of the right of privacy, and the present invention is exactly used for resisting this right of privacy Threaten.The present invention is detected the whether just online meeting of user and collects searching for personal information comprising using a kind of system and method Engine is sought, if original Search engine is found to be fly-by-night, the search of user request can be oriented to one by the present invention The individual Search engine that can be trusted.
The system of the present invention is built upon one for carrying out the user computing device of Web search searching engine, for example: Desktop PC, laptop computer, tablet PC or intelligent mobile phone.In an embodiment, user computing device It is responsible for monitoring and is re-directed to the Web search of user.In another embodiment, the present invention provides an intermediary server to be used to supervise Control and be re-directed to the Web search started by user computing device.This intermediary server is by network connection user meter Device is calculated, is planned to intercept Hyper-Text Transfer Protocol (HTTP) search request, and be can determine whether that this HTTP searches request and is No attempt connects to fly-by-night Search engine.In an embodiment, this intermediary server can be used in the HTTP of encryption (HTTPS) search request.The inventive method provides at least one URL(Uniform Resource Locator) (URL) kenel trusty first, and multiple The fly-by-night URL kenels (step A) of number.Fly-by-night URL(Uniform Resource Locator) kenel is stored in a form, its definition The kenel of various URLs unsafe to user privacy.At least one URL kenels trusty are for by unsafe Web search It is re-directed to Search engine trusty.This little at least one URL kenel trusty and plural fly-by-night URL kenels are In a manual fashion or the mode of sequencing is stored in user computing device, and with extendability indicating language (XML), JavaScript Object Notation (JSON) files or other computer-readable formats are presented.At least one trusted URL kenels and plural fly-by-night URL types both of which can include wild-character, and cover URLs partially or in whole.Wildcard Character can be such that character string or kenel is added in single kenel, and whether a search is asked to enable the more flexible identification of each kenel URL is asked to be derived from a fly-by-night Search engine.In an embodiment, the method for the present invention provides one and updates server, uses In update an at least trusted URL and plural trustless URL, this when new fly-by-night Search engine is found very It is useful.
Refer to Fig. 1.The method of the present invention is a kind of application software, and which includes computer executable instructions, with a monitoring The search that user is performed, and be re-directed to be considered as unsafe search.When the online predetermined Search engine of user simultaneously When starting a Web search, this application software receives a search request URL of this predetermined Search engine, wherein this search Request URL system is corresponding to this search request (step B).This reservation Search engine is exactly that user is wanted net is completed above The Search engine that network is searched.This reservation Search engine can be safe or unsafe Search engine.It is one pre- in order to determine this Determine whether Search engine is to be trusted, this search request URL is compared with plural fly-by-night URL kenels, to find out this Whether one reservation Search engine is in fly-by-night URL kenels (step C).If this reservation Search engine is simultaneously undiscovered In plural fly-by-night URL kenels, then this can complete to search request from request URL is searched once predetermined Search engine, And produce search result (step D).If this reservation Search engine is found in plural fly-by-night URL kenels, This application software will be searched request and be redirected into a Search engine (step trusty according to URL kenels trusty E).Trusted receive seek engine be one relative to an at least trusted URL kenels, and be considered as safe Search engine. Various embodiments of the present invention have one or more Search engines.Ask to carry out in website trusty by allowing search, or mat By being re-directed to attempt to ask in the search of fly-by-night website search, present invention can ensure that the privacy of user personal information Power.
As described above, in certain embodiments, the present invention updates plural fly-by-night URL using server timing is updated Kenel.Refer to Fig. 2 to Fig. 4.When the system of the present invention is comprising server is updated, this application software periodically can be required more New demand servicing device carries out the renewal of trustless kenel.The renewal of trustless kenel includes producing and edits:Kenel, URLs, company The information of knot, configuration file, icon and other various kenels.If renewal can be implemented, this application software self refresh is serviced Device obtains the renewal of trustless kenel, and the then renewal of trustless kenel is just merged in plural trustless URL kenels. The method of the present invention, allows fly-by-night Search engine, can be identified out when needed.Meanwhile, the method for the present invention is being distinguished During recognizing fly-by-night Search engine, constantly can become more efficiently.
Refer to Fig. 2, Fig. 3, and Fig. 5.Just as to, plural fly-by-night URL kenels, updating server can also It is changed for URL kenels trusty at least.It is that, up to this purpose, this application software may require that renewal server is fixed When carry out the renewal of trusted kenel.The renewal of trusted kenel includes producing and edits:Kenel, URLs, link, configuration shelves The information of case, icon and other various kenels.If renewal can be implemented, this application software self refresh server is obtained can Trust the renewal of kenel, the then renewal of trusted kenel is just merged in an at least trusted URL kenels.The side of the present invention Method, makes Web search be guided exactly and leaves fly-by-night Search engine.Meanwhile, the method for the present invention is by being updated to Few trusted URL kenels, and allow being used of most Search engines trusty.
Refer to Fig. 6.After application software compares search request URL and plural fly-by-night URLs, if predetermined Search engine do not find that among the fly-by-night URL kenels of plural number the search of user request can be without barrier Carry out in predetermined Search engine.It is that application software allows to search asks to be sent to predetermined Search engine up to this purpose. After predetermined Search engine produces the result searched, this application software receives the result of this search, then hands over this search result Pay user computing device.
Refer to Fig. 7.Among if predetermined Search engine is found in the fly-by-night URL kenels of plural number, this This search is re-directed to Search engine trusty by one application software.It is that, up to this purpose, this application software please from search This search request is extracted in seeking URL, and this search request is sent to into Search engine trusty.Then this application Software obtains search result from Search engine trusty, then this search result payment is given user computing device.Due to making The search request of user before with predetermined Search engine contact, be just redirected to will not collect personal information can The Search engine of trust, predetermined Search engine can't obtain the personal information of user.
The System and method for of the present invention mainly has two embodiments.In one embodiment, step A to step E all by User computing device is individually carried out.In the first embodiment, application software is only installed at user computing device.First implements Example is relatively adapted for use with the device of high operational capability, for example:Desktop PC, laptop computer or other similar dresses Put.In the first embodiment, this application software can be:Insert type web browser, browser extend software, self reliance type net Network browser or any similar application software for linking ability with network, including non-browser software.In second embodiment In, this one with software using intermediary server execution step A to step E, but some application softwaries and network on-line are with confidence Breath then needs user computing device and intermediary server jointlessly to contact.In a second embodiment, searching produced by step E Seek result and be sent to user computing device.Second embodiment is relatively adapted to be used in relatively low operational capability and the online energy of finite element network The computing device of power, for example:Intelligent mobile phone or tablet PC.Any configuration information for being installed on user computing device is soft Part can also regard intermediary server, to translate from user computing device the encryption information for sending out.Then, step A Can also include:Encryption HTTP (HTTPs) request related to request URL is searched is received, as shown in Figure 8.Then, this application Software can decrypt HTTPs requests, and each that then will search request URL and plural trustless URL kenels compares.
Although the present invention is illustrated as above with embodiment, but those are implemented routine and are only for illustrating the present invention, not For limiting the scope of the present invention.Here has usually intellectual in one field, according to carried out by disclosed content Various equivalent modifications and change, do not depart from the spirit of the present invention, and are contained in the interest field of the present invention.

Claims (8)

1. a kind of will to search the method that request is oriented to the Search engine trusted from mistrustful Search engine, which is by performing storage Implement in the computer executable instructions of a non-momentary computer-readable media, and include:
Step (A):At least one URL(Uniform Resource Locator) (URL) kenel trusty, and plural fly-by-night URL types are provided State;
Step (B):A search request URL of a predetermined Search engine is received, the wherein search request URL system is searched corresponding to one Request;
Step (C):Relatively the search request URL and each plural fly-by-night URL kenels, are drawn with finding out the reservation search Hold up whether in the plural fly-by-night URL kenels;
Step (D):If the reservation Search engine is not found in the plural fly-by-night URL kenels, this makes a reservation for Search engine just can complete to search request from the search request URL, and produce search result;And
Step (E):If the reservation Search engine is found in the plural fly-by-night URL types kenel, according to this extremely The search request is redirected into a Search engine trusty by few URL kenels trusty.
2. the method that will search as described in claims 1 asks the Search engine from mistrustful Search engine guiding trust, its The computer executable instructions that a non-momentary computer-readable media is stored in by execution are implemented, and further include:
There is provided one and update server;
Periodically require that the renewal server carries out the renewal of trustless kenel;
The renewal of trustless kenel is obtained from the renewal server;And
The renewal of trustless kenel is incorporated in the plural fly-by-night URL kenels.
3. the method that will search as described in claims 1 asks the Search engine from mistrustful Search engine guiding trust, its The computer executable instructions that a non-momentary computer-readable media is stored in by execution are implemented, and further include:
There is provided one and update server;
Periodically require that the renewal server carries out the renewal of trusted kenel;
The renewal of the trusted kenel is obtained from the renewal server;And
The renewal of the trusted kenel is incorporated at least one URL kenels trusty.
4. the method that will search as described in claims 1 asks the Search engine from mistrustful Search engine guiding trust, its The computer executable instructions that a non-momentary computer-readable media is stored in by execution are implemented, if wherein the reservation is searched Engine is not found in the plural fly-by-night URL kenels, then the method is further included:
The search request is allowed to be transferred into the predetermined Search engine;
Receive the search result that the predetermined Search engine is produced;And
Pay the search result and give a user computing device.
5. the method that will search as described in claims 1 asks the Search engine from mistrustful Search engine guiding trust, its The computer executable instructions that a non-momentary computer-readable media is stored in by execution are implemented, if wherein the reservation is searched Engine is found in the plural fly-by-night URL kenels, then the method is further included:
The search is extracted from the search request URL to ask;
The search request is sent to into a Search engine trusty;
Search result trusty is obtained from the Search engine trusty;And
Pay the search result and give a user computing device.
6. the method that will search as described in claims 1 asks the Search engine from mistrustful Search engine guiding trust, its The computer executable instructions that a non-momentary computer-readable media is stored in by execution are implemented, and wherein the step (A) extremely should Step (E) is performed by a user computing device.
7. the method that will search as described in claims 1 asks the Search engine from mistrustful Search engine guiding trust, its The computer executable instructions that a non-momentary computer-readable media is stored in by execution are implemented, wherein an intermediary server is held The row step (A) to the step (E);The search result produced by the step (E) is sent to a user computing device.
8. the method that will search as described in claims 1 asks the Search engine from mistrustful Search engine guiding trust, its The computer executable instructions that a non-momentary computer-readable media is stored in by execution are implemented, and further include:
Receive encryption Hyper-Text Transfer Protocol (HTTP) request related to the search request URL;And
The encryption HTTP request is decrypted, then by each phase of the search request URL and the plural fly-by-night URL kenels Relatively.
CN201580016151.9A 2014-05-30 2015-05-29 Method of redirecting search queries from an untrusted search engine to a trusted search engine Pending CN106537378A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201462005739P 2014-05-30 2014-05-30
US62/005,739 2014-05-30
PCT/US2015/033384 WO2015184392A2 (en) 2014-05-30 2015-05-29 Method of redirecting search queries from an untrusted search engine to a trusted search engine

Publications (1)

Publication Number Publication Date
CN106537378A true CN106537378A (en) 2017-03-22

Family

ID=56132524

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201580016151.9A Pending CN106537378A (en) 2014-05-30 2015-05-29 Method of redirecting search queries from an untrusted search engine to a trusted search engine

Country Status (2)

Country Link
EP (1) EP3047405A4 (en)
CN (1) CN106537378A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040078224A1 (en) * 2002-03-18 2004-04-22 Merck & Co., Inc. Computer assisted and/or implemented process and system for searching and producing source-specific sets of search results and a site search summary box
US20090112805A1 (en) * 2007-10-31 2009-04-30 Zachary Adam Garbow Method, system, and computer program product for implementing search query privacy
CN102073822A (en) * 2011-01-30 2011-05-25 北京搜狗科技发展有限公司 Method and system for preventing user information from leaking
CN102737119A (en) * 2012-05-30 2012-10-17 华为技术有限公司 Searching method, filtering method and related equipment and systems of uniform resource locator
CN102930211A (en) * 2012-11-07 2013-02-13 北京奇虎科技有限公司 Method for intercepting malicious URLs in multi-kernel browser and multi-kernel browser
US20140026221A1 (en) * 2012-07-17 2014-01-23 Oracle International Corporation Defense against search engine tracking

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040078224A1 (en) * 2002-03-18 2004-04-22 Merck & Co., Inc. Computer assisted and/or implemented process and system for searching and producing source-specific sets of search results and a site search summary box
US20090112805A1 (en) * 2007-10-31 2009-04-30 Zachary Adam Garbow Method, system, and computer program product for implementing search query privacy
CN102073822A (en) * 2011-01-30 2011-05-25 北京搜狗科技发展有限公司 Method and system for preventing user information from leaking
CN102737119A (en) * 2012-05-30 2012-10-17 华为技术有限公司 Searching method, filtering method and related equipment and systems of uniform resource locator
US20140026221A1 (en) * 2012-07-17 2014-01-23 Oracle International Corporation Defense against search engine tracking
CN102930211A (en) * 2012-11-07 2013-02-13 北京奇虎科技有限公司 Method for intercepting malicious URLs in multi-kernel browser and multi-kernel browser

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
K9WEBPROTECTION: "Enforcing K9 Safe Search", 《HTTP://WEB.ARCHIVE.ORG/WEB/20130129000652/HTTP://WWW1.K9WEBPROTECTION.COM/SUPPORT/ENFORCE-K9-SAFE-SEARCH》 *

Also Published As

Publication number Publication date
EP3047405A2 (en) 2016-07-27
EP3047405A4 (en) 2017-07-19

Similar Documents

Publication Publication Date Title
US11711438B2 (en) Systems and methods for controlling data exposure using artificial-intelligence-based periodic modeling
US11916944B2 (en) Network anomaly detection and profiling
CN105210042B (en) Internet protocol threatens protection
Eterovic-Soric et al. Stalking the stalkers–detecting and deterring stalking behaviours using technology: A review
Zulkarnine et al. Surfacing collaborated networks in dark web to find illicit and criminal content
Bonneau et al. Prying data out of a social network
CN101971591B (en) System and method of analyzing web addresses
CN105100034B (en) The method and apparatus of access function in a kind of network application
CN105100032B (en) A kind of method and device for preventing resource from stealing
CN104579773B (en) Domain name system analyzes method and device
CN105939326A (en) Message processing method and device
CN103853841A (en) Method for analyzing abnormal behavior of user in social networking site
CA3098702A1 (en) Systems and methods for controlling data exposure using artificial-intelligence-based modeling
CN107911282A (en) A kind of network system that third-party application implantation is realized towards social networks
Huh Implementation of lightweight intrusion detection model for security of smart green house and vertical farm
JP6576932B2 (en) How to redirect search requests from an untrusted search engine to a trusted search engine
Choi et al. Enhanced SDIoT security framework models
Van Haaster et al. Cyber guerilla
He et al. Mobile app identification for encrypted network flows by traffic correlation
Korać et al. A hybrid XSS attack (HYXSSA) based on fusion approach: Challenges, threats and implications in cybersecurity
Klint Cybersecurity in home-office environments: An examination of security best practices post Covid
CN106537378A (en) Method of redirecting search queries from an untrusted search engine to a trusted search engine
Lazarenko et al. Anonymity of tor: Myth and reality
Bolton et al. Privextractor: Toward redressing the imbalance of understanding between virtual assistant users and vendors
Rosengren Contribution of Open-Source Intelligence to Social Engineering Cyberattacks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1230302

Country of ref document: HK

RJ01 Rejection of invention patent application after publication

Application publication date: 20170322

RJ01 Rejection of invention patent application after publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1230302

Country of ref document: HK