Remote site connections are screened based on assessments performed by members of a trust community. Data based on a plurality of end-user assessments of particular remote sites are received at a server from a plurality of end-users. Each end-user is associated with a specific client machine which is in communication with the server. The server generates assessment scores based on the data. Each of the assessment scores may be a ratio of end-users. The server transmits the assessment scores to the client machines. The client machine selectively takes protective action against ones of the particular remote sites that have an undesirable assessment score generated by the server. The protective action may be determined by comparing the assessment score against an individually specified end-user rule, wherein at least two client machines have different rules.
System And Method For Network Administration And Local Administration Of Privacy Protection Criteria
Adam R. Schran - Philadelphia PA, US Robert E. Darlington - Philadelphia PA, US
Assignee:
Ascentive LLC - Philadelphia PA
International Classification:
G06F 17/30
US Classification:
707 10
Abstract:
Cookie files received from cookie file sources (e. g. , Internet websites) are screened based upon the recommendations of a service provider which downloads privacy protection criteria in the form of a “watch list” to a subscriber's client machine. A user-friendly interface allows the subscriber to optionally modify the watch list prior to it being used at the subscriber's client machine by assigning known cookie file sources to either a “trustlist” or a “blacklist. ” A “composite list” is then generated and used by the client machine to screen cookie files. The subscriber receives updates from the service provider on either a periodic or “as-needed” basis using a “quick update algorithm. ” A “privacy scanning algorithm” runs on the client machine and has two different modes of operation. The first is a continuous mode where unwanted cookie files are blocked from being stored at the client machine.
System And Method For Determining Network Configuration Settings That Provide Optimal Network Performance
Adam R. Schran - Philadelphia PA, US Robert E. Darlington - Philadelphia PA, US
Assignee:
Ascentive LLC - Philadelphia PA
International Classification:
G06F 15/177 G06F 15/173
US Classification:
709220, 709221, 709223
Abstract:
A system and method determines network configuration settings that provide optimal network performance for a user's computer (client machine). The computer is connected to a remote server via a network connection. A plurality of network configuration settings are selected for the computer. One or more performance tests using the selected network configuration settings are automatically conducted. An algorithm is used to determine the best network configuration settings and achieve the desired network performance characteristics for the computer based on preferences specified by the user. The network configuration settings of the computer are automatically adjusted based on the results of the performance tests. The user's computer can access network configuration setting recommendations from the remote server, based on network configuration settings and aggregate test results associated with other computers that previously were in communication with the remote server.
Computer Program Product For Determining A Group Of Network Configuration Settings That Provide Optimal Network Performance
Adam R. Schran - Philadelphia PA, US Robert E. Darlington - Philadelphia PA, US
Assignee:
Ascentive LLC - Philadelphia PA
International Classification:
G06F 15/16
US Classification:
709221, 709224
Abstract:
A computer program product is provided for optimizing network configuration settings for a user's client machine. A plurality of groups of network configuration settings are held in storage to be used by the user's client machine. A network connection is established between the user's client machine and a remote server. One of the groups of network configuration settings is selected to be used by the user's client machine from the provided groups of settings. One or more performance tests are conducted using the selected network configuration settings during the established network connection. The settings selection and the performance tests are repeated for one or more other groups of network configuration settings during the established network connection. The network configuration settings of the user's client machine provided in the groups are automatically adjusted based on the results of the performance tests. The adjusted network configuration settings are settings that optimize the performance of the user's client machine.
System And Method For Network Administration And Local Administration Of Privacy Protection Criteria
Adam R. Schran - Philadelphia PA, US Robert E. Darlington - Los Alamos NM, US
Assignee:
Ascentive LLC - Philadelphia PA
International Classification:
G06F 17/30
US Classification:
707748
Abstract:
Cookie files are screened in a client machine, wherein a cookie file includes a cookie file source. A request from a subscriber is received at a server to send a list of untrusted cookie file sources to the client machine. The list of untrusted cookie file sources is downloaded from the server to the client machine. The downloaded list of untrusted cookie file sources is used to detect cookie files received at the client machine from cookie file sources on the downloaded list by comparing the cookie file source of any received cookie file to the untrusted cookie file sources on the downloaded list.
Method And System For Screening Remote Site Connections And Filtering Data Based On A Community Trust Assessment
Remote site connections are screened based on assessments performed by members of a trust community. Data based on a plurality of-end user assessments of particular remote websites are received at a server from a plurality of end-users. Each end-user is associated with a specific client machine which is in communication with the server. The server generates assessment scores based on the data. The server transmits the assessment scores to the client machines. The client machine selectively takes protective action against ones of the particular remote websites that have an undesirable assessment score generated by the server.
System And Method For Network Administration And Local Administration Of Privacy Protection Criteria
Adam R. Schran - Philadelphia PA, US Robert E. Darlington - Philadelphia PA, US
Assignee:
Ascentive LLC - Philadelphia PA
International Classification:
G06F 17/30
US Classification:
707802
Abstract:
Cookie files are screened in a client machine, wherein a cookie file includes a cookie file source. A request from a subscriber is received at a server to send a list of untrusted cookie file sources to the client machine. The list of untrusted cookie file sources is downloaded from the server to the client machine. The downloaded list of untrusted cookie file sources is used to detect cookie files received at the client machine from cookie file sources on the downloaded list by comparing the cookie file source of any received cookie file to the untrusted cookie file sources on the downloaded list.
Supervising Monitoring And Controlling Activities Performed On A Client Device
Adam Schran - Philadelphia PA, US Michael Neil - Philadelphia PA, US
Assignee:
Ascentive LLC - Philadelphia PA
International Classification:
G06F017/00
US Classification:
707102000
Abstract:
A client monitoring application operating on a client device records and monitors human activity performed thereon. The client monitoring application forwards recorded activity to supervisor server(s) over a network. The supervisor server(s) enable a human supervisor to review human activity performed on the client device, issue alerts to the human when a particular activity is performed on the client device, and/or instruct the client monitoring application to intercept and block certain activities or classes of activities from taking place on the client device at any time or at designated times, or limited to designated durations. Recording and monitoring human activity performed on the client device includes capturing screen shots of real-time human activity performed on the client device, enabling viewing a screen shots even if data associated with the screen shots are transmitted, received, or saved in an encrypted format, which is particularly useful in the realm of counter terrorism, and child protection.