Browse Prior Art Database

System for Dis-integration of a browsing session to a visually similar URL

IP.com Disclosure Number: IPCOM000237566D
Publication Date: 2014-Jun-24
Document File: 4 page(s) / 40K

Publishing Venue

The IP.com Prior Art Database

Abstract

A system and method for disintegration of a browsing session to a visually similar uniform resource locator (URL) is disclosed.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 01 of 4

System for Dis-integration of a browsing session to a visually similar URL

Disclosed is a system and method for disintegration of a browsing session to a visually similar uniform resource locator (URL). After a period of inactivity, the session moves to a visually similar, but random URL.

The sender or recipient or administrator could specify this behavior as part of the link. This improves security. An individual or company policy can specify "apply this policy for all confidential data". In an example embodiment, the new URL could be to an unrelated URL that visually looks similar if viewed from a certain distance (e.g. taking into account images and text).

As individuals become more mobile, there is increased consumption of information on the move and de-perimeterisation. Users use laptops, tablets, phones, internet cafes and internet kiosks to access sometimes confidential and personal information. Sales people, businessmen and engineers may regularly use their computer to show content to other users - so increasing the risk further of important URLs being viewed. This increases risk to security. For example, when in the office or commuting on the train or bus it is easy to look over the shoulder and see what another user is browsing. This risk is compounded if the user has left the screen unlocked and others have access to the screen with the session open.

Some of the potential costs include:

Reputation cost


Damage to the brand
Financial cost
Legal action
Loss of Intellectual Property

It is advantageous that users do not leave confidential or personal web pages open for protracted periods of time. The method takes into account what the business, social network and individuals consider sensitive.

1


Page 02 of 4

There are many instances where users are sent messages directing to one or more URLs e.g. "Here is the sales data... go to this URL...". This is prone to user error as the browsing session may inadvertently be left open for prying eyes. This is specially useful where shared workstations are in use e.g. at home or in the office or at a client site.

The following typical scenario can occur many times:


UserA is a busy salesperson and regularly uses a web browser with many open windows and tabs. UserA just received an e-mail asking UserA to read a web page with sales information. Unfortunately, UserA got distracted while talking to a client and so the web page was left displayed on the screen where others could see the contents. To compound the problem, the sales person decided to give a demo of some software on the laptop which necessitated userA to open another tab.... Unfortunately, that tab contained some personal information which the client sees. There is no way for UserA, using his current internet browser system, to provide a disintegration o...