Virtual browsing environment
First Claim
1. An apparatus, comprising:
- a memory; and
a processor operatively coupled to the memory and connected to a network, the processor configured to receive a request to execute a browser application, the processor configured to initiate, in response to the request, the browser application within a virtual browsing environment,the processor configured to associate with the virtual browsing environment a list of indications of normal operations between the browser application and an operating system,the processor configured to identify potential malicious activity within the virtual browsing environment based on an indication of an operation of the browser application within the virtual browsing environment not being on the list of indications of normal operations between the browser application and an operating system, the processor configured to update a displayed indication of a status of the virtual browsing environment on a health monitor associated with the virtual browsing environment in response to identifying the potential malicious activity,the processor configured to transmit, to a collection computer via the network, information about a source of the potential malicious activity such that the collection computer takes action based on the source,the processor configured to terminate the browser application in response to identifying the potential malicious activity.
3 Assignments
0 Petitions
Accused Products
Abstract
An embodiment for providing a secure virtual browsing environment includes creating a virtual browsing environment with a virtualized operating system sharing an operating system kernel of a supporting operating system and executing the browser application within the virtual browsing environment. Another embodiment includes receiving a website selection within a browser application, determining if the website selection corresponds to a secure bookmark, and creating a second virtual browsing environment and executing the browser application within the second virtual browsing environment to access the website selection when the website selection corresponds to a website specified as a secure bookmark. Yet another embodiment includes monitoring operation of the operating system within the at least one virtual browsing environment, determining when the operation of the operating system includes potential malicious activity, and terminating the virtual browsing environment when the operation includes potential malicious activity.
-
Citations
22 Claims
-
1. An apparatus, comprising:
-
a memory; and a processor operatively coupled to the memory and connected to a network, the processor configured to receive a request to execute a browser application, the processor configured to initiate, in response to the request, the browser application within a virtual browsing environment, the processor configured to associate with the virtual browsing environment a list of indications of normal operations between the browser application and an operating system, the processor configured to identify potential malicious activity within the virtual browsing environment based on an indication of an operation of the browser application within the virtual browsing environment not being on the list of indications of normal operations between the browser application and an operating system, the processor configured to update a displayed indication of a status of the virtual browsing environment on a health monitor associated with the virtual browsing environment in response to identifying the potential malicious activity, the processor configured to transmit, to a collection computer via the network, information about a source of the potential malicious activity such that the collection computer takes action based on the source, the processor configured to terminate the browser application in response to identifying the potential malicious activity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 21, 22)
-
-
10. A non-transitory processor-readable medium storing code representing instructions to be executed by a processor, the code comprising code to cause the processor to:
-
receive a request to execute a browser application on a compute device; initiate, based on the request, the browser application within a virtual browsing environment on the compute device; associate with the virtual browsing environment a list of indications of normal operations between the browser application and an operating system; identify potential malicious activity within the virtual browsing environment based on an indication of an operation of the browser application within the virtual browsing environment not being on the list of indications of normal operations between the browser application and an operating system; update a displayed indication of a status of the virtual browsing environment on a health monitor associated with the virtual browsing environment in response to identifying the potential malicious activity; send, to a collection computer via a network and in response to the identifying, an identifier of a website accessed by the browser application and likely associated with the potential malicious activity; and restart the virtual browsing environment in response to the identifying. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A method, comprising:
-
initiating a virtual browsing environment including a browser application on a compute device; associating with the virtual browsing environment a list of indications of normal operations between the browser application and an operating system; identifying potential malicious activity based on an indication of an operation of the browser application within the virtual browsing environment not being on the list of indications of normal operations between the browser application and an operating system; updating a displayed indication of a status of the virtual browsing environment on a health monitor associated with the virtual browsing environment in response to identifying the potential malicious activity; identifying a source of the potential malicious activity by correlating a time associated with the operation of the browser application and a time associated with the browser application accessing the source; sending, to a collection computer via a network and in response to the identifying the potential malicious activity, an identifier of the source; and terminating the virtual browsing environment in response to identifying the potential malicious activity. - View Dependent Claims (17, 18, 19, 20)
-
Specification