MONITORING GOODS OFFERED FOR SALE ONLINE

20180005292 · 2018-01-04

Assignee

Inventors

Cpc classification

International classification

Abstract

A method of detecting attempts by online sellers to sell counterfeit goods on the internet, or to sell goods which they are not authorised to sell, is described. The user of a browser-enabled device when viewing a target website can determine whether the target website content is authorised or not. The browser may have a plug-in which allows the user to capture data from a target website, and send the data to a secure server which has access to or which stores data from the legitimate content owner or user. The data is then analysed to determine whether its use on the target website is authorised or legitimate, or not, and a warning or clearance message can then be sent from the secure server to the browser-enabled device to display that message to the user.

Claims

1. A method of authenticating material found by a user of a browser-enabled device on a target website with a view to determining whether the target website content is authorised or not, which comprises capturing data from a target website, sending the data from the a browser-enabled device to a secure server which has access to or which stores data from the legitimate content owner or user, analysing the data sent to determine whether its use on the target website is authorised or legitimate, or not, and sending a warning or clearance message from the secure server to the browser-enabled device to display that message to the user.

2. A method according to claim 1 where the browser-enabled device is a pc, tablet, laptop or smart phone, and where the browser installed in the device has a plug-in enabling the authentication method to be carried out.

3. A browser plugin designed and adapted to operate a browser on a browser-enabled device to carry out the method of claim 1.

Description

[0077] In the accompanying drawings:

[0078] FIG. 1 shows diagrammatically how the method of the invention may be put into effect;

[0079] FIG. 2 is a tabular diagram showing the interaction pattern for non-protected sites; and

[0080] FIG. 3 is a tabular diagram showing the interaction pattern for protected sites.

[0081] If the material to be protected, and the misuse of which is to be detected, is a company logo, this may have an identifier in the original genuine stored version of the logo such as:

<imgsrc=“/themes/wessextech/images/template/TML00123loihoihhpiujgpi.Wessex-technology-logo.png” alt=“Wessex Technology OEP Ltd.” Height=“69” width=“137”>

Trusted Image Dataset

[0082] The following text is an example of the type of data that would be held for the above item on the trusted image dataset.

Filename=“TML00123loihoihhpiujgpi.Wessex-technology-logo.png”
File_location_url=“www.wessextech.co.uk/themes/wessextech/images/template/”
Permitted_pages_url=“www.wessextech.co.uk/*”

Spoof Detection Dataset

[0083] The following text is an example of the type of data that would be held for the above item on the spoof detection dataset.

Keywords=“WESSEX,WESSEXTECH,WESSEXTECHNOLOGY,WESSEX TECHNOLOGY,COUNTERMARK”

[0084] As well as a reference graphic corresponding to the logo in question.