Network browser configuration
First Claim
1. A computer-implemented method for managing content comprising:
- receiving, at a trusted proxy server, a content request from a client computing device executing a programmatically configured browser application, wherein the trusted proxy server is configured to receive and respond to browser and proxy verification requests from an authenticating content server and wherein the content request corresponding to content served by the authenticating content server;
transmitting, by the trusted proxy server, a browser verification request to the client computing device;
receiving, by the trusted proxy server, information responsive to the browser verification request, the information responsive to the browser verification request including a verifiable representation of a browser application state associated with the programmatically configured browser application of the client computing device;
determining, by the trusted proxy server, based at least in part on the content request, a programmatic configuration of the programmatically configured browser application;
determining, by the trusted proxy server, based at least in part on a processing of the verifiable representation of the browser application state, that the programmatically configured browser application is operable to implement the programmatic configuration;
transmitting, by the trusted proxy server, the content request to the authenticating content server;
receiving, by the trusted proxy server, content responsive to the content request from the authenticating content server;
transmitting, by the trusted proxy server, data communications to the programmatically configured browsing application, the data communications causing an activation of the programmatic configuration; and
transmitting, by the trusted proxy server, the content responsive to the content request.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods, and computer-readable media related to configuration of browser applications executed on client computing device to control the functionality of the browser application as at least some content is accessed. The configuration of the browser application can be controlled programmatically such that the browser configuration can be validated and controlled by at least some content providers. Additionally, the configuration and subsequent processing of content provided by an authenticating content provider can be implemented in a manner such that users of a client computing device and other applications on the client computing device may not have access to modify or otherwise interfere with the operation of the browser software application.
-
Citations
22 Claims
-
1. A computer-implemented method for managing content comprising:
-
receiving, at a trusted proxy server, a content request from a client computing device executing a programmatically configured browser application, wherein the trusted proxy server is configured to receive and respond to browser and proxy verification requests from an authenticating content server and wherein the content request corresponding to content served by the authenticating content server; transmitting, by the trusted proxy server, a browser verification request to the client computing device; receiving, by the trusted proxy server, information responsive to the browser verification request, the information responsive to the browser verification request including a verifiable representation of a browser application state associated with the programmatically configured browser application of the client computing device; determining, by the trusted proxy server, based at least in part on the content request, a programmatic configuration of the programmatically configured browser application; determining, by the trusted proxy server, based at least in part on a processing of the verifiable representation of the browser application state, that the programmatically configured browser application is operable to implement the programmatic configuration; transmitting, by the trusted proxy server, the content request to the authenticating content server; receiving, by the trusted proxy server, content responsive to the content request from the authenticating content server; transmitting, by the trusted proxy server, data communications to the programmatically configured browsing application, the data communications causing an activation of the programmatic configuration; and transmitting, by the trusted proxy server, the content responsive to the content request. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system comprising:
a first processor and a first memory for executing first computer executable instructions, the first computer executable instructions implementing a trusted proxy server, wherein the trusted proxy server is configured to receive and respond to browser and proxy verification requests from an authenticating content server, that is operable to at least; receive, from a client computing device executing a programmatically configured browser application, a request for content corresponding to content served by the authenticating content server; cause transmission of a browser verification request to the client computing device, the browser verification request independent of the request for content; receive, from the client computing device, information responsive to the browser verification request, the information responsive to the browser verification request including an identifier of a programmatic configuration of the programmatically configured browser application; based on a processing of the information responsive to the browser verification request, cause transmission of data communications to the client computing device, the data communications causing an activation of the programmatic configuration; and cause transmission of the request for content. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15)
-
16. A method comprising:
-
receiving, by a trusted proxy server, wherein the trusted proxy server is configured to receive and respond to browser and proxy verification requests from an authenticating content server, a request for content from a client computing device executing a programmatically configured browser application, the request for content corresponding to content served by the authenticating content server; transmitting, by the trusted proxy server, a browser verification request to the client computing device, the browser verification request independent of the request for content; receiving, by the trusted proxy server, from the client computing device, information responsive to the browser verification request, the information responsive to the browser verification request including an identifier of a programmatic configuration of the programmatically configured browser application; based on a processing of the information responsive to the browser verification request, transmitting, by the trusted proxy server, data communications to the client computing device, the data communications causing an activation of the programmatic configuration; and transmitting, by the trusted proxy server, the request for content. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
Specification