GB2512753B - Controlling access to Internet resources - Google Patents
Controlling access to Internet resourcesInfo
- Publication number
- GB2512753B GB2512753B GB1406624.5A GB201406624A GB2512753B GB 2512753 B GB2512753 B GB 2512753B GB 201406624 A GB201406624 A GB 201406624A GB 2512753 B GB2512753 B GB 2512753B
- Authority
- GB
- United Kingdom
- Prior art keywords
- controlling access
- internet resources
- resources
- internet
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2119—Authenticating web pages, e.g. with suspicious links
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Computer And Data Communications (AREA)
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17126409P | 2009-04-21 | 2009-04-21 | |
US24138909P | 2009-09-10 | 2009-09-10 | |
US12/709,504 US8438386B2 (en) | 2009-04-21 | 2010-02-21 | System and method for developing a risk profile for an internet service |
GB1119949.4A GB2483808B (en) | 2009-04-21 | 2010-02-27 | System and method for developing a risk profile for an internet resource |
Publications (3)
Publication Number | Publication Date |
---|---|
GB201406624D0 GB201406624D0 (en) | 2014-05-28 |
GB2512753A GB2512753A (en) | 2014-10-08 |
GB2512753B true GB2512753B (en) | 2015-02-25 |
Family
ID=51536072
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1406624.5A Active GB2512753B (en) | 2009-04-21 | 2010-02-27 | Controlling access to Internet resources |
GB1406626.0A Active GB2512754B (en) | 2009-04-21 | 2010-02-27 | Training a Maximum Entropy Discrimination classifier for controlling access to an Internet Resource |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1406626.0A Active GB2512754B (en) | 2009-04-21 | 2010-02-27 | Training a Maximum Entropy Discrimination classifier for controlling access to an Internet Resource |
Country Status (1)
Country | Link |
---|---|
GB (2) | GB2512753B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10268976B2 (en) | 2016-02-17 | 2019-04-23 | SecurityScorecard, Inc. | Non-intrusive techniques for discovering and using organizational relationships |
CN113282921B (en) * | 2021-06-11 | 2024-07-09 | 深信服科技股份有限公司 | File detection method, device, equipment and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060253578A1 (en) * | 2005-05-03 | 2006-11-09 | Dixon Christopher J | Indicating website reputations during user interactions |
US20080082662A1 (en) * | 2006-05-19 | 2008-04-03 | Richard Dandliker | Method and apparatus for controlling access to network resources based on reputation |
-
2010
- 2010-02-27 GB GB1406624.5A patent/GB2512753B/en active Active
- 2010-02-27 GB GB1406626.0A patent/GB2512754B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060253578A1 (en) * | 2005-05-03 | 2006-11-09 | Dixon Christopher J | Indicating website reputations during user interactions |
US20080082662A1 (en) * | 2006-05-19 | 2008-04-03 | Richard Dandliker | Method and apparatus for controlling access to network resources based on reputation |
Also Published As
Publication number | Publication date |
---|---|
GB201406624D0 (en) | 2014-05-28 |
GB2512754A8 (en) | 2014-10-15 |
GB2512754A (en) | 2014-10-08 |
GB2512754B (en) | 2015-02-25 |
GB2512753A (en) | 2014-10-08 |
GB201406626D0 (en) | 2014-05-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IL215387A0 (en) | Application sharing | |
ZA201303867B (en) | Content provision | |
GB2501028B (en) | Subframe structure | |
EP2622818A4 (en) | Attention commands enhancement | |
EP2580293A4 (en) | Pre-treatment composition | |
EP2425609A4 (en) | Mid-service sharing | |
PL2393812T3 (en) | Substituted spiroamides as b1r-modulators | |
EP2374053A4 (en) | Virtual page turn | |
HK1168272A1 (en) | Performance enhancement | |
EP2457176A4 (en) | Virtual-machine-based application-service provision | |
HK1179439A1 (en) | Advanced content hosting | |
HK1184462A1 (en) | Monobactams | |
HK1217711A1 (en) | Antibodies specific to cadherin-17 -17 | |
GB201104542D0 (en) | Content provision | |
GB2476329B (en) | Improved access to structures | |
GB0802487D0 (en) | Improvement relating to firewalls | |
EP2317989A4 (en) | Microparticles | |
GB2512753B (en) | Controlling access to Internet resources | |
GB201004070D0 (en) | Content provision | |
GB2482561B (en) | Bush | |
EP2580067A4 (en) | Pre-treatment composition | |
GB0806706D0 (en) | Improvememts relating to opening devices | |
GB0907988D0 (en) | Internet based software | |
TWI365604B (en) | Delay circiuit | |
GB2481592B (en) | Improvements relating to equalizers |