Zum Hauptinhalt springen

Preventing Data Loss Using Enhanced Analysis of the URLs and URIs in Webpage Requests

2023
Online Patent

Titel:
Preventing Data Loss Using Enhanced Analysis of the URLs and URIs in Webpage Requests
Link:
Veröffentlichung: 2023
Medientyp: Patent
Sonstiges:
  • Nachgewiesen in: USPTO Patent Applications
  • Sprachen: English
  • Document Number: 20230403256
  • Publication Date: December 14, 2023
  • Appl. No: 17/840038
  • Application Filed: June 14, 2022
  • Claim: 1. A method comprising: at a computing device including at least one or more processors and memory: transmitting, by a user and to a proxy server, a request to access a webpage; determining, by the proxy server, whether: the webpage is included in a baseline associated with the user; or the webpage is not included in the baseline associated with the user; based on determining the webpage is not included in the baseline associated with the user, determining, by the proxy server and using an accessibility repository, whether: the webpage is accessible; or the webpage is inaccessible; based on determining the webpage is accessible, instructing an artificial intelligence model to analyze the webpage; parsing, by the artificial intelligence model, a URL and a URI associated with the request; determining, by the artificial intelligence model, whether: the URI corresponds to source code associated with the webpage; or the URI fails to corresponds to the source code; based on determining that the URI fails to correspond to the source code, flagging, by the artificial intelligence model, the webpage as malicious; transmitting, by the artificial intelligence model and to the proxy server, instructions to deny the request to access the webpage; storing, by the artificial intelligence model, the webpage in the accessibility repository; and transmitting, by the proxy server and to the user, a notification indicating denial of the request to access the webpage.
  • Claim: 2. The method of claim 1, wherein the transmitting the request to access the webpage further comprises at least one of: transmitting the request, by the user and to an internet, across a public or private network; or transmitting the request, by the user, using an application programming interface (API) hosted on a user computing device.
  • Claim: 3. The method of claim 1, wherein the baseline associated with the user indicates a plurality of webpages that the user accesses during interactions with an enterprise organization.
  • Claim: 4. The method of claim 1, wherein the accessibility repository is comprised of an allow list of webpages and a deny list of webpages, and wherein: the allow list indicates a first plurality of webpages, identified by an enterprise organization, that the user is permitted to access; and the deny list indicates a second plurality of webpages, identified by the enterprise organization, that the user is not permitted to access.
  • Claim: 5. The method of claim 4, wherein: the allow list is based on at least one of: a role, within the enterprise organization, associated with the user; a team, within the enterprise organization, associated with the user; or an industry associated with the enterprise organization; and the deny list is based on crawling an internet, by the artificial intelligence model, to identify malicious webpages.
  • Claim: 6. The method of claim 1, wherein the determining whether the URI corresponds to the source code further comprises: parsing the source code to identify a header; comparing the URL to data within the header; and determining that the data within the header corresponds to the URL.
  • Claim: 7. The method of claim 1, further comprising: based on determining that the URI corresponds to the source code associated with the webpage, transmitting, by the artificial intelligence model and to the proxy server, instructions to provide the webpage to the user; and storing, by the artificial intelligence model, the webpage in the baseline associated with the user.
  • Claim: 8. The method of claim 1, further comprising: based on determining that the URI corresponds to the source code associated with the webpage, monitoring, by the artificial intelligence model, interaction between the user and the webpage; and determining, by the artificial intelligence model, whether: the interaction corresponds an expected interaction; or the interaction does not correspond to the expected interaction.
  • Claim: 9. The method of claim 8, further comprising one of: based on determining that the interaction corresponds to the expected interaction, monitoring further interaction between the user and the webpage; or based on determining that the interaction does not correspond to the expected interaction: transmitting, by the artificial intelligence model and to the proxy server, instructions to stop transmitting the webpage to the user; and transmitting, by the proxy server and to the user, a notification indicating denial of access to the webpage.
  • Claim: 10. The method of claim 1, further comprising, based on determining the webpage is included in the baseline associated with the user, instructing the proxy server to transmit the webpage to the user.
  • Claim: 11. The method of claim 1, further comprising, based on determining the webpage is inaccessible, transmitting, by the proxy server and to the user, the notification indicating the denial of the request to access the webpage.
  • Claim: 12. A computing platform comprising: at least one processor; a communication interface communicatively coupled to the at least one processor; and memory storing computer-readable instructions that, when executed by the at least one processor, cause the computing platform to: transmit, by a user and to a proxy server, a request to access a webpage; determine, by the proxy server, whether: the webpage is included in a baseline associated with the user; or the webpage is not included in the baseline associated with the user; based on determining the webpage is not included in the baseline associated with the user, determine, by the proxy server and using an accessibility repository, whether: the webpage is accessible; or the webpage is inaccessible; based on determining the webpage is accessible, instruct an artificial intelligence model to analyze the webpage; parse, by the artificial intelligence model, a URL and a URI associated with the request; determine, by the artificial intelligence model, whether: the URI corresponds to source code associated with the webpage; or the URI fails to corresponds to the source code; based on determining that the URI fails to correspond to the source code, flag, by the artificial intelligence model, the webpage as malicious; transmit, by the artificial intelligence model and to the proxy server, instructions to deny the request to access the webpage; store, by the artificial intelligence model, the webpage in the accessibility repository; and transmit, by the proxy server and to the user, a notification indicating denial of the request to access the webpage.
  • Claim: 13. The computing platform of claim 12, wherein the instructions, when executed, further cause the computing platform to: based on determining that the URI corresponds to the source code associated with the webpage, transmit, by the artificial intelligence model and to the proxy server, instructions to provide the webpage to the user; and store, by the artificial intelligence model, the webpage in the baseline associated with the user.
  • Claim: 14. The computing platform of claim 12, wherein the instructions, when executed, further cause the computing platform to: based on determining that the URI corresponds to the source code associated with the webpage, monitor, by the artificial intelligence model, interaction between the user and the webpage; and determine, by the artificial intelligence model, whether: the interaction corresponds an expected interaction; or the interaction does not correspond to the expected interaction.
  • Claim: 15. The computing platform of claim 14, wherein the instructions, when executed, further cause the computing platform to: based on determining that the interaction corresponds to the expected interaction, monitor further interaction between the user and the webpage; or based on determining that the interaction does not correspond to the expected interaction: transmit, by the artificial intelligence model and to the proxy server, instructions to stop transmitting the webpage to the user; and transmit, by the proxy server and to the user, a notification indicating denial of access to the webpage.
  • Claim: 16. The computing platform of claim 12, wherein the instructions, when executed, further cause the computing platform to, based on determining the webpage is included in the baseline associated with the user, instruct the proxy server to transmit the webpage to the user.
  • Claim: 17. The computing platform of claim 12, wherein the instructions, when executed, further cause the computing platform to, based on determining the webpage is inaccessible, transmit, by the proxy server and to the user, the notification indicating the denial of the request to access the webpage.
  • Claim: 18. One or more non-transitory computer-readable media storing instructions that, when executed by a computing platform comprising at least one processor, memory, and a communication interface, cause the computing platform to: transmit, by a user and to a proxy server, a request to access a webpage; determine, by the proxy server, whether: the webpage is included in a baseline associated with the user; or the webpage is not included in the baseline associated with the user; based on determining the webpage is not included in the baseline associated with the user, determine, by the proxy server and using an accessibility repository, whether: the webpage is accessible; or the webpage is inaccessible; based on determining the webpage is accessible, instruct an artificial intelligence model to analyze the webpage; parse, by the artificial intelligence model, a URL and a URI associated with the request; determine, by the artificial intelligence model, whether: the URI corresponds to source code associated with the webpage; or the URI fails to corresponds to the source code; based on determining that the URI fails to correspond to the source code, flag, by the artificial intelligence model, the webpage as malicious; transmit, by the artificial intelligence model and to the proxy server, instructions to deny the request to access the webpage; store, by the artificial intelligence model, the webpage in the accessibility repository; and transmit, by the proxy server and to the user, a notification indicating denial of the request to access the webpage.
  • Claim: 19. The one or more non-transitory computer-readable media of claim 18, wherein the instructions, when executed, further cause the computing platform to: based on determining that the URI corresponds to the source code associated with the webpage, transmit, by the artificial intelligence model and to the proxy server, instructions to provide the webpage to the user; and store, by the artificial intelligence model, the webpage in the baseline associated with the user.
  • Claim: 20. The one or more non-transitory computer-readable media of claim 18, wherein the instructions, when executed, further cause the computing platform to: based on determining that the URI corresponds to the source code associated with the webpage, monitor, by the artificial intelligence model, interaction between the user and the webpage; and determine, by the artificial intelligence model, whether: the interaction corresponds an expected interaction; or the interaction does not correspond to the expected interaction.
  • Current International Class: 04; 06; 06

Klicken Sie ein Format an und speichern Sie dann die Daten oder geben Sie eine Empfänger-Adresse ein und lassen Sie sich per Email zusenden.

oder
oder

Wählen Sie das für Sie passende Zitationsformat und kopieren Sie es dann in die Zwischenablage, lassen es sich per Mail zusenden oder speichern es als PDF-Datei.

oder
oder

Bitte prüfen Sie, ob die Zitation formal korrekt ist, bevor Sie sie in einer Arbeit verwenden. Benutzen Sie gegebenenfalls den "Exportieren"-Dialog, wenn Sie ein Literaturverwaltungsprogramm verwenden und die Zitat-Angaben selbst formatieren wollen.

xs 0 - 576
sm 576 - 768
md 768 - 992
lg 992 - 1200
xl 1200 - 1366
xxl 1366 -