WO2007093550A1 - Preventing a web browser from loading content from undesirable sources - Google Patents

Preventing a web browser from loading content from undesirable sources Download PDF

Info

Publication number
WO2007093550A1
WO2007093550A1 PCT/EP2007/051208 EP2007051208W WO2007093550A1 WO 2007093550 A1 WO2007093550 A1 WO 2007093550A1 EP 2007051208 W EP2007051208 W EP 2007051208W WO 2007093550 A1 WO2007093550 A1 WO 2007093550A1
Authority
WO
WIPO (PCT)
Prior art keywords
content
alternate
undesirable
address
web page
Prior art date
Application number
PCT/EP2007/051208
Other languages
French (fr)
Inventor
Fonda Daniels
Patrick Guido
Wesley Jerome Gyure
Kent Fillmore Hayes Jr
Robert Charles Leah
Paul Franklin Mcmahan
Original Assignee
International Business Machines Corporation
Ibm United Kingdom Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corporation, Ibm United Kingdom Limited filed Critical International Business Machines Corporation
Priority to CA002636259A priority Critical patent/CA2636259A1/en
Priority to JP2008553760A priority patent/JP4988768B2/en
Priority to EP07712169A priority patent/EP1989652A1/en
Publication of WO2007093550A1 publication Critical patent/WO2007093550A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links

Definitions

  • the present invention generally relates to the Internet, and more specifically relates to a method, system, and computer program product for preventing a web browser from loading content from undesirable sources.
  • Web pages often include banner advertisements and popup windows that originate from third party sources (e.g., ad servers) .
  • banner advertisements and popup windows are well behaved and do not significantly intrude on an end user's experience.
  • banner advertisements and popup windows can be very distracting and annoying to a user and can contain undesirable content. Flashy multimedia in banner advertisements and popup windows can consume significant bandwidth and can even infect a user' s computer with unwanted software.
  • Such unwanted software can include, for example, software that covertly gathers user information through a user's Internet connection without his or her knowledge, usually for advertising purposes (e.g., spyware) , software (often malicious) that installs itself surreptitiously on a user's computer (e.g., a Trojan horse), or software that causes a popup window to spawn one or more subsequent popup windows when closed by a user.
  • Banner advertisements and popup windows can also contain undesirable content (e.g., pornography) that is offensive to some users .
  • FIG. 1 An illustrative web page 10 assembled by a web browser using content retrieved from a plurality of different sources is depicted in FIG. 1.
  • One or more sections of the web page 10 are used to display information that is not necessarily relevant to the main content 12 of the web page 10.
  • the information is provided in the form of banner advertisements 14, 16 and a popup window 18, which have been delineated from the main content 12 using dotted lines for illustrative purposes only.
  • the information displayed in the banner advertisements 14, 16 and the popup window 18 is retrieved by the web browser rendering the web page 10 from one or more web servers 20.
  • the typically “undesired” content 24 for the banner advertisements 14, 16 and the popup window 18 is obtained by the web browser by pointing to a respective website (e.g., adsitel.com, adsite2.com, adsite3.com) on a respective web server 20 using a hostname (via a domain name service (DNS) or hosts file) or an Internet Protocol (IP) address 26.
  • DNS domain name service
  • IP Internet Protocol
  • the “desired" main content 12 of the web page 10 is obtained in a similar manner from one or more websites (e.g., contentsite (s) .com) on one or more web servers 20.
  • a first aspect of the present invention is directed to a method for preventing a web browser from loading content from an undesirable source, comprising: selecting an area of a web page containing undesirable content; substituting an alternate Internet Protocol (IP) address for a hostname of a website that provided the undesirable content based on a profile; and redisplaying the web page with content from the alternate IP address displayed in the selected area of the web page.
  • IP Internet Protocol
  • a second aspect of the present invention is directed to a system for preventing a web browser from loading content from an undesirable source, comprising : a system for selecting an area of a web page containing undesirable content; a system for substituting an alternate Internet Protocol (IP) address for a hostname of a website that provided the undesirable content based on a profile; and a system for displaying the web page with content from the alternate IP address displayed in the selected area of the web page.
  • IP Internet Protocol
  • a third aspect of the present invention is directed to a program product stored on a computer readable medium for preventing a web browser from loading content from an undesirable source, the computer readable medium comprising program code for performing the steps of: selecting an area of a web page containing undesirable content; substituting an alternate Internet Protocol (IP) address for a hostname of a website that provided the undesirable content based on a profile; and redisplaying the web page with content from the alternate IP address displayed in the selected area of the web page.
  • IP Internet Protocol
  • a fourth aspect of the present invention is directed to a method for deploying an application for preventing a web browser from loading content from an undesirable source, comprising: providing a computer infrastructure being operable to: select an area of a web page containing undesirable content; substitute an alternate Internet Protocol (IP) address for a hostname of a website that provided the undesirable content based on a profile; and redisplay the web page with content from the alternate IP address displayed in the selected area of the web page.
  • IP Internet Protocol
  • a fifth aspect of the present invention is directed to computer software embodied in a propagated signal for preventing a web browser from loading content from an undesirable source, the computer software comprising program code for causing a computer system to perform the following steps: selecting an area of a web page containing undesirable content; substituting an alternate Internet Protocol (IP) address for a hostname of a website that provided the undesirable content based on a profile; and redisplaying the web page with content from the alternate IP address displayed in the selected area of the web page.
  • IP Internet Protocol
  • FIG. 1 depicts an illustrative web page including banner advertisements and a popup window
  • FIG. 2 depicts an illustrative flow diagram of a method in accordance with an embodiment of the present invention
  • FIGS. 3-5 depict an illustrative operational example in accordance with an embodiment of the present invention
  • FIG. 6 depicts an illustrative computer system for implementing embodiment (s) of the present invention.
  • a flow diagram 30 of a method in accordance with an embodiment of the present invention is depicted in FIG. 2.
  • a user selects an area (e.g., banner advertisement, popup window, etc.) of a web page containing undesirable content.
  • the banner advertisement 14 on the web page 10 by positioning a mouse pointer 32 over the banner advertisement 14 and actuating (e.g., right-clicking) a designated button on the mouse.
  • a context menu 34 is displayed in step S2.
  • a context menu 34 may also be displayed, for example, in response to an actuation of a function key, keyboard shortcut, etc.
  • the user selects the "Avoid content from this site" command 36 from the context menu 34.
  • an embodiment of the present invention substitutes an alternate IP address for the hostname of the website that provided the undesirable content.
  • a browser module/plug-in 38 substitutes in a local DNS server 42 (or hosts file) an alternate IP address 40 (e.g., xxx.xxx.x.x) for the hostname (e.g., adsitel.com) of the website that provided the undesirable content.
  • the substitution is based on a profile 44.
  • the alternate IP address 40 points to a website (e.g., desirable-contentsite.com) that provides more desirable content for display in the banner advertisement 14.
  • One or more profiles 44 can be associated with each user and selectively accessed.
  • step S5 the user loads or reloads the web page 10 at a later time.
  • step S6 content from the website associated with the alternate IP address 40 is displayed in the area selected by the user in step Sl.
  • the local DNS server 42 or hosts file
  • the local DNS server 42 now points to the website (desirable-contentsite.com) corresponding to the alternate IP address (xxx.xxx.x.x) provided by the browser module/plug-in 38.
  • desirable content from the website desirable-contentsite.com in this example stock quotes, is now displayed in the banner advertisement 14 instead of the undesirable content previously provided by the website adsitel . com.
  • the profile 44 (FIG. 4) is used to control the content that is loaded in a selected area (e.g., banner advertisement, popup window, etc.) of a web page in place of undesirable content.
  • the profile 44 can be created by a user to drive the behavior of the content loading.
  • Preset profiles 44 are also possible. Virtually any type of profile 44 can be used in the practice of embodiments of the present invention.
  • the profile 44 could be configured by a user 46 via a user interface (UI) 48 (FIG. to:
  • Display content (e.g., images, graphics, text, content from a portlet, etc.) from one or more selected websites in place of undesirable content .
  • Display content (advertisements, product information, etc.) from the website of one or more selected entities (e.g., company, organization, retailer, etc.) in place of undesirable content.
  • selected entities e.g., company, organization, retailer, etc.
  • FIG. 6 A computer system 100 for preventing a web browser from loading content from undesirable sources in accordance with an embodiment of the present invention is depicted in FIG. 6.
  • Computer system 100 is provided in a computer infrastructure 102.
  • Computer system 100 is intended to represent any type of computer system suitable for use with embodiments of the present invention.
  • computer system 100 can be a laptop computer, a desktop computer, a workstation, a handheld device, a server, a cluster of computers, etc.
  • computer system 100 can be deployed and/or operated by a service provider that provides a service for preventing a web browser from loading content from undesirable sources in accordance with embodiments of the present invention.
  • a user 46 can access computer system 100 directly, or can operate a computer system that communicates with computer system 100 over a network 106 (e.g., the Internet, a wide area network (WAN) , a local area network (LAN) , a virtual private network (VPN) , etc) .
  • a network 106 e.g., the Internet, a wide area network (WAN) , a local area network (LAN) , a virtual private network (VPN) , etc
  • the communication links can comprise addressable connections that can utilize any combination of wired and/or wireless transmission methods.
  • connectivity can be provided by conventional TCP/IP sockets-based protocol, and an Internet service provider can be used to establish connectivity to the Internet.
  • Computer system 100 is shown including a processing unit 108, a memory 110, a bus 112, and input/output (I/O) interfaces 114. Further, computer system 100 is shown in communication with external devices/resources 116 and one or more storage units 118.
  • processing unit 108 executes computer program code, such as content control system 130, that is stored in memory 110 and/or storage units (s) 118. While executing computer program code, processing unit 108 can read and/or write data, to/from memory 110, storage unit(s) 118, and/or I/O interfaces 114.
  • Bus 112 provides a communication link between each of the components in computer system 100.
  • External devices/resources 116 can comprise any devices (e.g., keyboard, pointing device, display (e.g., display 120, printer, etc.) that enable a user to interact with computer system 100 and/or any devices (e.g., network card, modem, etc.) that enable computer system 100 to communicate with one or more other computing devices .
  • devices e.g., keyboard, pointing device, display (e.g., display 120, printer, etc.
  • any devices e.g., network card, modem, etc.
  • Computer infrastructure 102 is only illustrative of various types of computer infrastructures that can be used to implement embodiments of the present invention.
  • computer infrastructure 102 can comprise two or more computing devices (e.g., a server cluster) that communicate over a network (e.g., network 106) to perform the various process steps of a preferred embodiment of the present invention.
  • network 106 e.g., network 106
  • computer system 100 is only representative of the many types of computer systems that can be used in the practice of embodiments of the present invention, each of which can include numerous combinations of hardware/software.
  • processing unit 108 can comprise a single processing unit, or can be distributed across one or more processing units in one or more locations, e.g., on a client and server.
  • memory 110 and/or storage unit(s) 118 can comprise any combination of various types of data storage and/or transmission media that reside at one or more physical locations.
  • I/O interfaces 114 can comprise any system for exchanging information with one or more external devices/resources 116.
  • one or more additional components e.g., system software, communication systems, cache memory, etc. not shown in FIG. 6 can be included in computer system 100.
  • computer system 100 comprises a handheld device or the like
  • one or more external devices/resources 116 e.g., a display
  • one or more storage unit(s) 118 can be contained within computer system 100, and not externally as shown.
  • Storage unit(s) 118 can be any type of system (e.g., a database) capable of providing storage for information in embodiments of the present invention.
  • storage unit(s) 118 can include one or more storage devices, such as a magnetic disk drive or an optical disk drive.
  • storage unit(s) 118 can include data distributed across, for example, a local area network (LAN), wide area network (WAN) or a storage area network (SAN) (not shown) .
  • LAN local area network
  • WAN wide area network
  • SAN storage area network
  • computer systems operated by user 46 can contain computerized components similar to those described above with regard to computer system 100.
  • Shown in memory 110 is a content control system 130 for preventing a web browser 132 from loading content from undesirable sources in accordance with embodiment (s) of the present invention.
  • the content control system 130 includes a selection system 134 for selecting (by the user) an area of a web page 10 containing undesirable content.
  • a context menu 34 (FIG. 3) is displayed that includes a command such as "Avoid content from this site.”
  • a browser module/plug-in 38 substitutes in a local DNS server 42 (or hosts file) an alternate IP address for the hostname of the website that provided the undesirable content.
  • the provision of the alternate IP address is based on profile information provided in a profile 44.
  • Embodiments of the present invention can be offered as a business method on a subscription or fee basis.
  • one or more components can be created, maintained, supported, and/or deployed by a service provider that offers the functions described herein for customers. That is, a service provider can be used to provide a service for preventing a web browser from loading content from undesirable sources, as described above.
  • embodiments of the present invention can be realized in hardware, software, a propagated signal, or any combination thereof. Any kind of computer/server system(s) - or other apparatus adapted for carrying out the methods described herein - is suitable.
  • a typical combination of hardware and software can include a general purpose computer system with a computer program that, when loaded and executed, carries out the respective methods described herein.
  • a specific use computer containing specialized hardware for carrying out one or more of the functional tasks of embodiments of the invention, can be utilized.
  • Embodiments of the present invention can also be embedded in a computer program product or a propagated signal, which comprises all the respective features enabling the implementation of the methods described herein, and which - when loaded in a computer system - is able to carry out these methods.
  • Embodiments of the present invention can take an entirely hardware form, an entirely software form, or an embodiment containing both hardware and software elements.
  • Embodiments of the present invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system.
  • a computer-usable or computer-readable medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
  • the medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) , or a propagation medium.
  • Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, removable computer diskette, random access memory (RAM) , read-only memory (ROM) , rigid magnetic disk and optical disk.
  • Current examples of optical disks include a compact disk - read only disk (CD-ROM) , a compact disk - read/write disk (CD-R/W) , and a digital versatile disk (DVD) .
  • Computer program, propagated signal, software program, program, or software in the present context mean any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following:

Abstract

The present invention provides a method, system, and computer program product for preventing a browser from loading content from undesirable sources. A method in accordance with an embodiment of the present invention includes: selecting an area of a web page containing undesirable content; substituting an alternate Internet Protocol (IP) address for a hostname of a website that provided the undesirable content based on a profile; and redisplaying the web page with content from the alternate IP address displayed in the selected area of the web page.

Description

PREVENTING A WEB BROWSER FROM LOADING CONTENT FROM UNDESIRABLE SOURCES
Field of the Invention
The present invention generally relates to the Internet, and more specifically relates to a method, system, and computer program product for preventing a web browser from loading content from undesirable sources.
Background of the Invention
Web pages often include banner advertisements and popup windows that originate from third party sources (e.g., ad servers) . For the most part, such banner advertisements and popup windows are well behaved and do not significantly intrude on an end user's experience. However at other times (and this is becoming much more common) banner advertisements and popup windows can be very distracting and annoying to a user and can contain undesirable content. Flashy multimedia in banner advertisements and popup windows can consume significant bandwidth and can even infect a user' s computer with unwanted software. Such unwanted software can include, for example, software that covertly gathers user information through a user's Internet connection without his or her knowledge, usually for advertising purposes (e.g., spyware) , software (often malicious) that installs itself surreptitiously on a user's computer (e.g., a Trojan horse), or software that causes a popup window to spawn one or more subsequent popup windows when closed by a user. Banner advertisements and popup windows can also contain undesirable content (e.g., pornography) that is offensive to some users .
An illustrative web page 10 assembled by a web browser using content retrieved from a plurality of different sources is depicted in FIG. 1. One or more sections of the web page 10 are used to display information that is not necessarily relevant to the main content 12 of the web page 10. In this example, the information is provided in the form of banner advertisements 14, 16 and a popup window 18, which have been delineated from the main content 12 using dotted lines for illustrative purposes only. The information displayed in the banner advertisements 14, 16 and the popup window 18 is retrieved by the web browser rendering the web page 10 from one or more web servers 20. The typically "undesired" content 24 for the banner advertisements 14, 16 and the popup window 18 is obtained by the web browser by pointing to a respective website (e.g., adsitel.com, adsite2.com, adsite3.com) on a respective web server 20 using a hostname (via a domain name service (DNS) or hosts file) or an Internet Protocol (IP) address 26. The "desired" main content 12 of the web page 10 is obtained in a similar manner from one or more websites (e.g., contentsite (s) .com) on one or more web servers 20.
Since the undesirable content in a web page usually comes from third party sources, the website hosting the web page is often oblivious to the problems experienced by an end user that are associated with banner advertisements and popup windows. Accordingly, there is a need for a way for a user to selectively block out content from undesirable third party sources while still retaining desirable content in place on a web page.
SUMMARY OF THE INVENTION
Provided is a method, system, and computer program product for preventing a web browser from loading content from undesirable sources.
A first aspect of the present invention is directed to a method for preventing a web browser from loading content from an undesirable source, comprising: selecting an area of a web page containing undesirable content; substituting an alternate Internet Protocol (IP) address for a hostname of a website that provided the undesirable content based on a profile; and redisplaying the web page with content from the alternate IP address displayed in the selected area of the web page.
A second aspect of the present invention is directed to a system for preventing a web browser from loading content from an undesirable source, comprising : a system for selecting an area of a web page containing undesirable content; a system for substituting an alternate Internet Protocol (IP) address for a hostname of a website that provided the undesirable content based on a profile; and a system for displaying the web page with content from the alternate IP address displayed in the selected area of the web page.
A third aspect of the present invention is directed to a program product stored on a computer readable medium for preventing a web browser from loading content from an undesirable source, the computer readable medium comprising program code for performing the steps of: selecting an area of a web page containing undesirable content; substituting an alternate Internet Protocol (IP) address for a hostname of a website that provided the undesirable content based on a profile; and redisplaying the web page with content from the alternate IP address displayed in the selected area of the web page.
A fourth aspect of the present invention is directed to a method for deploying an application for preventing a web browser from loading content from an undesirable source, comprising: providing a computer infrastructure being operable to: select an area of a web page containing undesirable content; substitute an alternate Internet Protocol (IP) address for a hostname of a website that provided the undesirable content based on a profile; and redisplay the web page with content from the alternate IP address displayed in the selected area of the web page.
A fifth aspect of the present invention is directed to computer software embodied in a propagated signal for preventing a web browser from loading content from an undesirable source, the computer software comprising program code for causing a computer system to perform the following steps: selecting an area of a web page containing undesirable content; substituting an alternate Internet Protocol (IP) address for a hostname of a website that provided the undesirable content based on a profile; and redisplaying the web page with content from the alternate IP address displayed in the selected area of the web page.
The illustrative aspects of the present invention are designed to solve the problems herein described and other problems not discussed.
BRIEF DESCRIPTION OF THE DRAWINGS
Embodiments of the present invention are described by way of example only with reference to the following drawings in which: FIG. 1 depicts an illustrative web page including banner advertisements and a popup window; FIG. 2 depicts an illustrative flow diagram of a method in accordance with an embodiment of the present invention;
FIGS. 3-5 depict an illustrative operational example in accordance with an embodiment of the present invention; and FIG. 6 depicts an illustrative computer system for implementing embodiment (s) of the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
Provided is a method, system, and computer program product for preventing a web browser from loading content from undesirable sources.
A flow diagram 30 of a method in accordance with an embodiment of the present invention is depicted in FIG. 2. In step Sl, a user selects an area (e.g., banner advertisement, popup window, etc.) of a web page containing undesirable content. As shown in FIG. 3, for example, the user has selected the banner advertisement 14 on the web page 10 by positioning a mouse pointer 32 over the banner advertisement 14 and actuating (e.g., right-clicking) a designated button on the mouse. Other selection methodologies are also possible. In response, a context menu 34 is displayed in step S2. A context menu 34 may also be displayed, for example, in response to an actuation of a function key, keyboard shortcut, etc. In step S3, the user selects the "Avoid content from this site" command 36 from the context menu 34.
In step S4, in response to the user selection of the "Avoid content from this site" command 36 from the context menu 34, an embodiment of the present invention substitutes an alternate IP address for the hostname of the website that provided the undesirable content. For instance, as shown in FIG. 4, a browser module/plug-in 38 substitutes in a local DNS server 42 (or hosts file) an alternate IP address 40 (e.g., xxx.xxx.x.x) for the hostname (e.g., adsitel.com) of the website that provided the undesirable content. The substitution is based on a profile 44. In this example, the alternate IP address 40 points to a website (e.g., desirable-contentsite.com) that provides more desirable content for display in the banner advertisement 14. One or more profiles 44 can be associated with each user and selectively accessed.
In step S5, the user loads or reloads the web page 10 at a later time. In step S6, content from the website associated with the alternate IP address 40 is displayed in the area selected by the user in step Sl. In the above example, as shown in FIG. 5, when a request for content from the website adsitel.com is received by the local DNS server 42 (or hosts file) , the local DNS server 42 (or hosts file) now points to the website (desirable-contentsite.com) corresponding to the alternate IP address (xxx.xxx.x.x) provided by the browser module/plug-in 38. As a result, desirable content from the website desirable-contentsite.com, in this example stock quotes, is now displayed in the banner advertisement 14 instead of the undesirable content previously provided by the website adsitel . com.
The profile 44 (FIG. 4) is used to control the content that is loaded in a selected area (e.g., banner advertisement, popup window, etc.) of a web page in place of undesirable content. The profile 44 can be created by a user to drive the behavior of the content loading. Preset profiles 44 are also possible. Virtually any type of profile 44 can be used in the practice of embodiments of the present invention. For example, the profile 44 could be configured by a user 46 via a user interface (UI) 48 (FIG. to:
Display content (e.g., images, graphics, text, content from a portlet, etc.) from one or more selected websites in place of undesirable content .
Display content pertaining to one or more types of selected subject matter in place of undesirable content.
Display content (advertisements, product information, etc.) from the website of one or more selected entities (e.g., company, organization, retailer, etc.) in place of undesirable content.
Replace undesirable content in popup windows, but not banner advertisements, or vice versa.
Replace undesirable content originating from specific websites with more desirable content.
Replace undesirable content associated with a specific entity (e.g., company, organization, retailer, etc.) or containing a specific type of subject matter (e.g., pornography) with other more desirable content . - When used within a corporate intranet or within a service provider's domain, replace undesirable content with more desirable content for the entire set of users for which service is provided.
A computer system 100 for preventing a web browser from loading content from undesirable sources in accordance with an embodiment of the present invention is depicted in FIG. 6. Computer system 100 is provided in a computer infrastructure 102. Computer system 100 is intended to represent any type of computer system suitable for use with embodiments of the present invention. For example, computer system 100 can be a laptop computer, a desktop computer, a workstation, a handheld device, a server, a cluster of computers, etc. In addition, as will be further described below, computer system 100 can be deployed and/or operated by a service provider that provides a service for preventing a web browser from loading content from undesirable sources in accordance with embodiments of the present invention. It should be appreciated that a user 46 can access computer system 100 directly, or can operate a computer system that communicates with computer system 100 over a network 106 (e.g., the Internet, a wide area network (WAN) , a local area network (LAN) , a virtual private network (VPN) , etc) . In the case of the latter, communications between computer system 100 and a user-operated computer system can occur via any combination of various types of communications links. For example, the communication links can comprise addressable connections that can utilize any combination of wired and/or wireless transmission methods. Where communications occur via the Internet, connectivity can be provided by conventional TCP/IP sockets-based protocol, and an Internet service provider can be used to establish connectivity to the Internet.
Computer system 100 is shown including a processing unit 108, a memory 110, a bus 112, and input/output (I/O) interfaces 114. Further, computer system 100 is shown in communication with external devices/resources 116 and one or more storage units 118. In general, processing unit 108 executes computer program code, such as content control system 130, that is stored in memory 110 and/or storage units (s) 118. While executing computer program code, processing unit 108 can read and/or write data, to/from memory 110, storage unit(s) 118, and/or I/O interfaces 114. Bus 112 provides a communication link between each of the components in computer system 100. External devices/resources 116 can comprise any devices (e.g., keyboard, pointing device, display (e.g., display 120, printer, etc.) that enable a user to interact with computer system 100 and/or any devices (e.g., network card, modem, etc.) that enable computer system 100 to communicate with one or more other computing devices .
Computer infrastructure 102 is only illustrative of various types of computer infrastructures that can be used to implement embodiments of the present invention. For example, in one embodiment, computer infrastructure 102 can comprise two or more computing devices (e.g., a server cluster) that communicate over a network (e.g., network 106) to perform the various process steps of a preferred embodiment of the present invention. Moreover, computer system 100 is only representative of the many types of computer systems that can be used in the practice of embodiments of the present invention, each of which can include numerous combinations of hardware/software. For example, processing unit 108 can comprise a single processing unit, or can be distributed across one or more processing units in one or more locations, e.g., on a client and server. Similarly, memory 110 and/or storage unit(s) 118 can comprise any combination of various types of data storage and/or transmission media that reside at one or more physical locations. Further, I/O interfaces 114 can comprise any system for exchanging information with one or more external devices/resources 116. Still further, it is understood that one or more additional components (e.g., system software, communication systems, cache memory, etc.) not shown in FIG. 6 can be included in computer system 100.
However, if computer system 100 comprises a handheld device or the like, it is understood that one or more external devices/resources 116 (e.g., a display) and/or one or more storage unit(s) 118 can be contained within computer system 100, and not externally as shown.
Storage unit(s) 118 can be any type of system (e.g., a database) capable of providing storage for information in embodiments of the present invention. To this extent, storage unit(s) 118 can include one or more storage devices, such as a magnetic disk drive or an optical disk drive. In another embodiment, storage unit(s) 118 can include data distributed across, for example, a local area network (LAN), wide area network (WAN) or a storage area network (SAN) (not shown) . Moreover, although not shown, computer systems operated by user 46 can contain computerized components similar to those described above with regard to computer system 100.
Shown in memory 110 (e.g., as a computer program product) is a content control system 130 for preventing a web browser 132 from loading content from undesirable sources in accordance with embodiment (s) of the present invention. The content control system 130 includes a selection system 134 for selecting (by the user) an area of a web page 10 containing undesirable content. In response to the selection of an area of the web page 10 containing undesirable content, a context menu 34 (FIG. 3) is displayed that includes a command such as "Avoid content from this site." Upon selection of this command, a browser module/plug-in 38 substitutes in a local DNS server 42 (or hosts file) an alternate IP address for the hostname of the website that provided the undesirable content. The provision of the alternate IP address is based on profile information provided in a profile 44. When the web page 10 is subsequently loaded/reloaded, content from the website associated with the alternate IP address is displayed in the selected area of the web page 10, as described above .
Embodiments of the present invention can be offered as a business method on a subscription or fee basis. For example, one or more components can be created, maintained, supported, and/or deployed by a service provider that offers the functions described herein for customers. That is, a service provider can be used to provide a service for preventing a web browser from loading content from undesirable sources, as described above.
It should also be understood that embodiments of the present invention can be realized in hardware, software, a propagated signal, or any combination thereof. Any kind of computer/server system(s) - or other apparatus adapted for carrying out the methods described herein - is suitable. A typical combination of hardware and software can include a general purpose computer system with a computer program that, when loaded and executed, carries out the respective methods described herein. Alternatively, a specific use computer, containing specialized hardware for carrying out one or more of the functional tasks of embodiments of the invention, can be utilized. Embodiments of the present invention can also be embedded in a computer program product or a propagated signal, which comprises all the respective features enabling the implementation of the methods described herein, and which - when loaded in a computer system - is able to carry out these methods.
Embodiments of the present invention can take an entirely hardware form, an entirely software form, or an embodiment containing both hardware and software elements.
Embodiments of the present invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system. For the purposes of this description, a computer-usable or computer-readable medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
The medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) , or a propagation medium. Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, removable computer diskette, random access memory (RAM) , read-only memory (ROM) , rigid magnetic disk and optical disk. Current examples of optical disks include a compact disk - read only disk (CD-ROM) , a compact disk - read/write disk (CD-R/W) , and a digital versatile disk (DVD) .
Computer program, propagated signal, software program, program, or software, in the present context mean any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following:
(a) conversion to another language, code or notation; and/or
(b) reproduction in a different material form.
The foregoing description of the preferred embodiments of this invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed, and obviously, many modifications and variations are possible.

Claims

1. A method for preventing a web browser from loading content from an undesirable source, comprising: selecting an area of a web page containing undesirable content; substituting an alternate Internet Protocol (IP) address for a hostname of a website that provided the undesirable content based on a profile; and redisplaying the web page with content from the alternate IP address displayed in the selected area of the web page.
2. The method of claim 1, wherein the area of the web page is selected from the group consisting of a banner and a popup window.
3. The method of claim 1, wherein selecting the area of the web page further comprises: displaying a context menu; and selecting a command from the context window for avoiding content from the website that provided the undesirable content.
4. The method of claim 1, wherein substituting the alternate IP address further comprises: providing the alternate IP address to a domain name service (DNS) .
5. The method of claim 1, wherein substituting the alternate IP address further comprises: providing the alternate IP address to a hosts file.
6. The method of claim 1, wherein the profile causes content from a selected website to be displayed in place of the undesirable content.
7. The method of claim 1, wherein the profile causes content pertaining to a particular subject matter to be displayed in place of the undesirable content.
8. The method of claim 1, wherein the profile causes content from a website of a selected entity to be displayed in place of the undesirable content .
9. The method of claim 1, wherein the profile causes undesirable content originating from a specific website to be replaced with the content from the alternate IP address.
10. The method of claim 1, wherein the profile causes undesirable content associated with a specific entity to be replaced with the content from the alternate IP address.
11. A system for preventing a web browser from loading content from an undesirable source, comprising:. a system for selecting an area of a web page containing undesirable content; a system for substituting an alternate Internet Protocol (IP) address for a hostname of a website that provided the undesirable content based on a profile; and a system for displaying the web page with content from the alternate IP address displayed in the selected area of the web page.
12. The system of claim 11, wherein the area of the web page is selected from the group consisting of a banner and a popup window.
13. The system of claim 11, wherein the system for selecting the area of the web page further comprises: a system for displaying a context menu; and a system for selecting a command from the context window for avoiding content from the website that provided the undesirable content.
14. The system of claim 11, wherein the system for substituting the alternate IP address further comprises: a system for providing the alternate IP address to a domain name service (DNS) .
15. The system of claim 11, wherein the system for substituting the alternate IP address further comprises: a system for providing the alternate IP address to a hosts file.
16. The system of claim 11, wherein the profile causes content from a selected website to be displayed in place of the undesirable content.
17. The system of claim 11, wherein the profile causes content pertaining to a particular subject matter to be displayed in place of the undesirable content.
18. The system of claim 11, wherein the profile causes content from a website of a selected entity to be displayed in place of the undesirable content .
19. The system of claim 11, wherein the profile causes undesirable content originating from a specific website to be replaced with the content from the alternate IP address.
20. The system of claim 11, wherein the profile causes undesirable content associated with a specific entity to be replaced with the content from the alternate IP address.
21. A program product stored on a computer readable medium for preventing a web browser from loading content from an undesirable source, the computer readable medium comprising program code for performing the steps of: selecting an area of a web page containing undesirable content; substituting an alternate Internet Protocol (IP) address for a hostname of a website that provided the undesirable content based on a profile; and redisplaying the web page with content from the alternate IP address displayed in the selected area of the web page.
22. A method for deploying an application for preventing a web browser from loading content from an undesirable source, comprising: providing a computer infrastructure being operable to: select an area of a web page containing undesirable content; substitute an alternate Internet Protocol (IP) address for a hostname of a website that provided the undesirable content based on a profile; and redisplay the web page with content from the alternate IP address displayed in the selected area of the web page.
PCT/EP2007/051208 2006-02-13 2007-02-08 Preventing a web browser from loading content from undesirable sources WO2007093550A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CA002636259A CA2636259A1 (en) 2006-02-13 2007-02-08 Preventing a web browser from loading content from undesirable sources
JP2008553760A JP4988768B2 (en) 2006-02-13 2007-02-08 Prevent web browsers from loading content from unwanted sources
EP07712169A EP1989652A1 (en) 2006-02-13 2007-02-08 Preventing a web browser from loading content from undesirable sources

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/352,665 2006-02-13
US11/352,665 US8195822B2 (en) 2006-02-13 2006-02-13 Substituting content for undesirable content in a web browser

Publications (1)

Publication Number Publication Date
WO2007093550A1 true WO2007093550A1 (en) 2007-08-23

Family

ID=38113117

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2007/051208 WO2007093550A1 (en) 2006-02-13 2007-02-08 Preventing a web browser from loading content from undesirable sources

Country Status (6)

Country Link
US (2) US8195822B2 (en)
EP (1) EP1989652A1 (en)
JP (1) JP4988768B2 (en)
CN (1) CN101379505A (en)
CA (1) CA2636259A1 (en)
WO (1) WO2007093550A1 (en)

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7966395B1 (en) 2005-08-23 2011-06-21 Amazon Technologies, Inc. System and method for indicating interest of online content
US8826411B2 (en) * 2006-03-15 2014-09-02 Blue Coat Systems, Inc. Client-side extensions for use in connection with HTTP proxy policy enforcement
US7797421B1 (en) * 2006-12-15 2010-09-14 Amazon Technologies, Inc. Method and system for determining and notifying users of undesirable network content
US9712560B2 (en) 2007-11-05 2017-07-18 Cabara Software Ltd. Web page and web browser protection against malicious injections
US9509714B2 (en) 2014-05-22 2016-11-29 Cabara Software Ltd. Web page and web browser protection against malicious injections
US8620288B2 (en) * 2007-11-16 2013-12-31 Alcatel Lucent Targeted mobile content insertion and/or replacement
US9639626B2 (en) * 2009-04-09 2017-05-02 International Business Machines Corporation Web-browser based state repository
US20110153583A1 (en) * 2009-12-23 2011-06-23 Cbs Interactive, Inc. Url proxy method and apparatus
US20110225480A1 (en) * 2010-03-09 2011-09-15 Cbs Interactive Url proxy method and apparatus
US20110231770A1 (en) * 2010-03-18 2011-09-22 Tovar Tom C Systems and methods for a temporary mechanism for selective blocking of internet content
CN102200980B (en) * 2010-03-25 2013-06-19 北京搜狗科技发展有限公司 Method and system for providing network resources
US8881054B2 (en) * 2010-05-07 2014-11-04 Microsoft Corporation One step selection of disabled options
CN102207976A (en) * 2011-06-24 2011-10-05 厦门雅迅网络股份有限公司 Method for downloading and browsing webpage data
EP2642718B1 (en) * 2012-03-23 2020-09-23 Saasid Limited Dynamic rendering of a document object model
GB201205117D0 (en) 2012-03-23 2012-05-09 Saasid Ltd Dynamic rendering of a document object model
US10261938B1 (en) 2012-08-31 2019-04-16 Amazon Technologies, Inc. Content preloading using predictive models
US9853995B2 (en) 2012-11-08 2017-12-26 AO Kaspersky Lab System and method for restricting pathways to harmful hosts in computer networks
US9971888B2 (en) * 2013-03-15 2018-05-15 Id Integration, Inc. OS security filter
US9231996B2 (en) * 2013-04-12 2016-01-05 International Business Machines Corporation User-influenced page loading of web content
JP5882279B2 (en) * 2013-10-08 2016-03-09 Necパーソナルコンピュータ株式会社 Information processing apparatus, method, and program
US20150160830A1 (en) * 2013-12-05 2015-06-11 Microsoft Corporation Interactive content consumption through text and image selection
US20150278853A1 (en) * 2014-04-01 2015-10-01 DoubleVerify, Inc. System And Method For Identifying Hidden Content
US11882171B2 (en) 2017-09-29 2024-01-23 AVAST Software s.r.o. Instanced web servers for displaying custom content in a secure context

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030098882A1 (en) * 2001-11-27 2003-05-29 Cowden Jax B. Method and apparatus for blocking unwanted windows
US20040088570A1 (en) * 2001-12-21 2004-05-06 Roberts Guy William Welch Predictive malware scanning of internet data
US6904569B1 (en) * 2001-07-26 2005-06-07 Gateway, Inc. Link-level browser instance control

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1053331A (en) 1996-08-09 1998-02-24 Kobe Steel Ltd Powder and grain conveying system in gaseous flow
US6324553B1 (en) * 1997-11-26 2001-11-27 International Business Machines Corporation Apparatus and method for the manual selective blocking of images
JP3844588B2 (en) * 1998-03-05 2006-11-15 富士通株式会社 Information management system, local computer, and computer-readable recording medium recording information acquisition program
US6226677B1 (en) * 1998-11-25 2001-05-01 Lodgenet Entertainment Corporation Controlled communications over a global computer network
AU1399400A (en) * 1998-12-03 2000-06-19 British Telecommunications Public Limited Company Network management system
JP2001100501A (en) 1999-09-28 2001-04-13 Brother Ind Ltd Developing device, developing unit cartridge, process cartridge and image forming device
US6449636B1 (en) * 1999-09-08 2002-09-10 Nortel Networks Limited System and method for creating a dynamic data file from collected and filtered web pages
US6742043B1 (en) * 2000-01-14 2004-05-25 Webtv Networks, Inc. Reformatting with modular proxy server
US20010029527A1 (en) * 2000-03-15 2001-10-11 Nadav Goshen Method and system for providing a customized browser network
DE10024733A1 (en) 2000-05-19 2001-11-22 Clemente Spehr Blocking data for request from network involves requesting data via Clean Surf Server using predetermined filter criterion and acting as filter to distinguish unwanted data from tolerated data
US6704024B2 (en) * 2000-08-07 2004-03-09 Zframe, Inc. Visual content browsing using rasterized representations
US6703883B2 (en) 2001-03-29 2004-03-09 Koninklijke Philips Electronics N.V. Low current clock sensor
JP3596482B2 (en) * 2001-03-30 2004-12-02 ムサシ化成工業株式会社 Personal banner creation program
US20030115343A1 (en) * 2001-12-17 2003-06-19 Mosey Thomas R. Unwanted routing block
US7231458B2 (en) * 2001-12-27 2007-06-12 Nortel Networks Limited Method and apparatus for discovering client proximity using race type translations
KR20030065064A (en) * 2002-01-29 2003-08-06 삼성전자주식회사 Method for managing domain name
US20030233482A1 (en) * 2002-06-18 2003-12-18 Skrepetos Nicholas C. System and method for enhancing a user's web browsing experience
US20050033849A1 (en) * 2002-06-20 2005-02-10 Bellsouth Intellectual Property Corporation Content blocking
US7818764B2 (en) * 2002-06-20 2010-10-19 At&T Intellectual Property I, L.P. System and method for monitoring blocked content
US20040146006A1 (en) * 2003-01-24 2004-07-29 Jackson Daniel H. System and method for internal network data traffic control
KR100453408B1 (en) 2003-05-23 2004-10-20 이영희 The web-access managing system and the web-access managing method through packet checking interval

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6904569B1 (en) * 2001-07-26 2005-06-07 Gateway, Inc. Link-level browser instance control
US20030098882A1 (en) * 2001-11-27 2003-05-29 Cowden Jax B. Method and apparatus for blocking unwanted windows
US20040088570A1 (en) * 2001-12-21 2004-05-06 Roberts Guy William Welch Predictive malware scanning of internet data

Also Published As

Publication number Publication date
CA2636259A1 (en) 2007-08-23
US20120197985A1 (en) 2012-08-02
US8195822B2 (en) 2012-06-05
CN101379505A (en) 2009-03-04
US20070192485A1 (en) 2007-08-16
EP1989652A1 (en) 2008-11-12
JP4988768B2 (en) 2012-08-01
JP2009527032A (en) 2009-07-23
US8458351B2 (en) 2013-06-04

Similar Documents

Publication Publication Date Title
US8458351B2 (en) Substituting content for undesirable content in a web browser
US8176185B2 (en) Method of switching Internet personas based on URL
US9147004B2 (en) Website builder systems and methods with device detection to adapt rendering behavior based on device type
JP4208081B2 (en) System, web server, method and program for adding personalized value to multiple websites
JP4849692B2 (en) Method and apparatus for selecting and delivering portable portlets
US10296558B1 (en) Remote generation of composite content pages
US9223548B2 (en) Method and apparatus for providing an application canvas framework
US20070226327A1 (en) Reuse of a mobile device application in a desktop environment
US20120101907A1 (en) Securing Expandable Display Advertisements in a Display Advertising Environment
US20070226633A1 (en) Copying and pasting portlets in a portal environment
JP4856704B2 (en) Computer-implemented method, system, and computer program for representing data as graphical topology representation (computer-implemented method for representing data as graphical topology representation)
KR20120053086A (en) Techniques for modifying the behavior of documents delivered over a computer network
JP2010500689A (en) Method for enabling web analysis of interactive web applications
US20070061707A1 (en) Method, system, and computer program product for providing virtual views in an on-demand portal infrastructure
JP5137479B2 (en) Method and system for utilizing a computer to manage server-based rendering of messages in a heterogeneous environment
US20210081464A1 (en) Crawlability of single page applications
US20200336551A1 (en) Cross-site semi-anonymous tracking
US20070011336A1 (en) Method for managing contents of a web site
KR20100010482A (en) Automatic rendering of user interface elements
US8392267B1 (en) System, method, and software application for dynamically generating a link to an online procurement site within a software application
US20050050093A1 (en) Customized selection of a voice file for a web page
US20020191032A1 (en) Method and apparatus for viewing and managing information in a history
Cunningham Are cookies hazardous to your privacy? Cookies allow businesses to collect information about Internet users, but some question whether they are valuable records or unethical tracking mechanisms.(NetWise)
US20220114017A1 (en) Remapping elements based on a transition of device states
Imam et al. What is Cookie, it’s Phenomenon and it’s Private Residence Overview

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2636259

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 200780004454.4

Country of ref document: CN

WWE Wipo information: entry into national phase

Ref document number: 2008553760

Country of ref document: JP

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2007712169

Country of ref document: EP