ENHANCED BROWSER SECURITY
First Claim
1. A method of transferring a computer program product from at least one first computer to at least one second computer connected to the at least one first computer through a communication medium, the method comprising the steps of:
- (a) accessing, on the at least one first computer, computer-executable instructions that, when executed in a system operable to execute a browser application having at least one security-context zone and operable to apply at least one security policy to interaction between the system and web sites corresponding to domain identifiers populating the at least one security-context zone, perform at least the steps of;
(1) comparing a first set of domain identifiers populating a first security-context zone of the at least one security-context zone with a second set of domain identifiers; and
(2) populating the first security-context zone with at least one second-set identifier not included in the first set of domain identifiers; and
(b) transferring the computer-executable instructions from the at least one first computer to the at least one second computer through the communications medium.
3 Assignments
0 Petitions
Accused Products
Abstract
A machine-executable method implementable in a system operable to execute a browser application having at least one security-context zone and operable to apply at least one security policy to interaction between the system and web sites corresponding to domain identifiers populating the at least one security-context zone includes comparing a first set of domain identifiers populating a first security-context zone of the at least one security-context zone with a second set of domain identifiers. The method further includes populating the first security-context zone with at least one second-set identifier not included in the first set of domain identifiers.
58 Citations
21 Claims
-
1. A method of transferring a computer program product from at least one first computer to at least one second computer connected to the at least one first computer through a communication medium, the method comprising the steps of:
-
(a) accessing, on the at least one first computer, computer-executable instructions that, when executed in a system operable to execute a browser application having at least one security-context zone and operable to apply at least one security policy to interaction between the system and web sites corresponding to domain identifiers populating the at least one security-context zone, perform at least the steps of;
(1) comparing a first set of domain identifiers populating a first security-context zone of the at least one security-context zone with a second set of domain identifiers; and
(2) populating the first security-context zone with at least one second-set identifier not included in the first set of domain identifiers; and
(b) transferring the computer-executable instructions from the at least one first computer to the at least one second computer through the communications medium. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-readable medium having computer-executable components implementable in a system operable to execute a browser application having at least one security-context zone and operable to apply at least one security policy to interaction between the system and web sites corresponding to domain identifiers populating the at least one security-context zone, the components comprising:
-
a first domain-identifier file; and
a populating component operable to;
(1) compare a first set of domain identifiers populating a first security-context zone of the at least one security-context zone with a second set of domain identifiers populating the first file; and
(2) populate the first security-context zone with at least one second-set identifier not included in the first set of domain identifiers. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-readable medium having computer-executable instructions that, when executed in a system operable to execute a browser application having at least one security-context zone and operable to apply at least one security policy to interaction between the system and web sites corresponding to domain identifiers populating the at least one security-context zone, perform at least the steps of:
-
comparing a first set of domain identifiers populating a first security-context zone of the at least one security-context zone with a second set of domain identifiers; and
populating the first security-context zone with at least one second-set identifier not included in the first set of domain identifiers. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A method, comprising:
-
reviewing a set of web sites including at least one web site having at least one characteristic associated therewith;
categorizing into a first category at least one said web site based on the at least one said web site having a first characteristic; and
providing to an electronic device a set of domain identifiers corresponding to the first-category web sites, wherein the domain-identifier set enables the electronic device to inform a user that the first-category web sites have the first characteristic.
-
Specification