SANDBOX WEB NAVIGATION
First Claim
1. A method comprising:
- detecting selection of a hyperlink in a host session of a host system;
determining that a web page referenced by the hyperlink should be opened in a sandbox session, wherein the sandbox session virtualizes at least some resources of the host system;
creating the sandbox session;
opening a web browser in the sandbox session; and
loading the web page referenced by the hyperlink in the web browser in the sandbox session.
1 Assignment
0 Petitions
Accused Products
Abstract
Browsing the World Wide Web may expose a user'"'"'s system to malicious attacks that can lead to data loss and/or system failure. Sometimes a user desires to access information on a web page that may contain malicious content. For example, a college student researching computer hacking may need information provided on a hacking website even though the site is potentially dangerous. Although techniques are employed to install potentially harmful executable files into a sandbox (e.g., virtual machine), these techniques do not address navigation of harmful sites. Functionality can be implemented to instantiate a web browser within a controlled virtual environment (“sandbox”) that simulates the host system while restricting the virtual environment to designated space(s) and/or resources of the host system to prevent harmful effects. Instantiating the web browser in the sandbox allows web navigation of risky web sites without deleterious effects on the host system.
-
Citations
23 Claims
-
1. A method comprising:
-
detecting selection of a hyperlink in a host session of a host system; determining that a web page referenced by the hyperlink should be opened in a sandbox session, wherein the sandbox session virtualizes at least some resources of the host system; creating the sandbox session; opening a web browser in the sandbox session; and loading the web page referenced by the hyperlink in the web browser in the sandbox session. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
determining that a web page referenced by a hyperlink should be opened in a sandbox session, wherein the sandbox session virtualizes resources of a host system; loading the web page in a web browser in the sandbox session; detecting a request to save an artifact of the web page; determining that the artifact is free of malicious content; and saving the artifact to persist beyond termination of the sandbox session. - View Dependent Claims (10, 11, 12, 13)
-
-
14. One or more machine-readable media having stored therein a program product, which when executed by a set of one or more processor units causes the set of one or more processor units to perform operations that comprise:
-
detecting selection of a hyperlink in a host session of a host system; determining that a web page referenced by the hyperlink should be opened in a sandbox session, wherein the sandbox session virtualizes at least some resources of the host system; creating the sandbox session; opening a web browser in the sandbox session; and loading the web page referenced by the hyperlink in the web browser in the sandbox session. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. An apparatus comprising:
-
a set of one or more processing units; a network interface; and a sandbox session management unit operable to, detect selection of a hyperlink in a host session of a host system; determine that a web page referenced by the hyperlink should be opened in a sandbox session, wherein the sandbox session virtualizes at least some resources of the host system; create the sandbox session; open a web browser in the sandbox session; and load the web page referenced by the hyperlink in the web browser in the sandbox session. - View Dependent Claims (23)
-
Specification