System and method to detect online privacy violation

    公开(公告)号:US09934542B2

    公开(公告)日:2018-04-03

    申请号:US14493316

    申请日:2014-09-22

    CPC classification number: G06Q50/265 G06Q30/01

    Abstract: The present invention relates to a method to detect online privacy violation. The method comprising steps of embedding a tracker into a web browser to open at least one data consumer website or at least one third party website wherein a user submits at least one data value into their corresponding data field in a data consumer website; generating one or more privacy profile using the tracker wherein the profile assists the user to select one or more data fields as per the user preferences; capturing the user selected one or more data fields and their corresponding plurality of browsing history using the tracker; storing the profile and the plurality of browsing history into at least one database; triggering of the tracker for detecting online privacy violation in a third party website and submitting at least one data field into at least one input field to detect online privacy violation for the submitted data field.

    METHOD AND SYSTEM TO IDENTIFY KEY LOGGING ACTIVITIES
    2.
    发明申请
    METHOD AND SYSTEM TO IDENTIFY KEY LOGGING ACTIVITIES 审中-公开
    识别主要记录活动的方法和系统

    公开(公告)号:US20150172310A1

    公开(公告)日:2015-06-18

    申请号:US14493648

    申请日:2014-09-23

    CPC classification number: H04L63/1441 G06F21/566 G06F2221/031

    Abstract: A method and a system to identify key logging activities is described. The method comprises triggering of at least one cloud computing network by opening of at least one browser of one or more digital device, generating of at least one proof by the cloud computing network and sending the generated proof to the sanitizer, triggering of the sanitizer by opening of the browser of the digital device to generate one or more random sequence of keystrokes, generating at least one malicious list by the sanitizer by capturing the system processes that capture the randomly generated keystrokes, updating the cloud computing network by the sanitizer with the generated malicious list, retrieving of proof by each of the system processes, verifying of the fetched proof of the system process by the proof checker and updating the cloud computing network with the restricted system processes by the proof checker.

    Abstract translation: 描述了一种识别关键记录活动的方法和系统。 该方法包括通过打开一个或多个数字设备的至少一个浏览器来触发至少一个云计算网络,由云计算网络生成至少一个证明,并将生成的证明发送到消毒器,触发消毒器 打开数字设备的浏览器以产生一个或多个随机的击键序列,由消毒器通过捕获捕获随机生成的击键的系统进程产生至少一个恶意列表,由消毒器用生成的消息来更新云计算网络 恶意列表,通过每个系统进程检索证明,验证验证检查器获取的系统过程的证明,并通过验证检查程序以限制的系统进程更新云计算网络。

Patent Agency Ranking