ENFORCING COMMUNICATION SECURITY FOR SELECTED RESOURCES
First Claim
1. A computer readable medium having instructions stored thereon that, when executed by a processor, cause the processor to perform a process that identifies and provides selected secure resources, the process comprising:
- determining whether a resource of a web page that is requested in a first request by a client computer requires a secure connection based on a type of the resource that is requested;
redirecting the client computer to a secure socket for the resource when the resource requires the secure connection;
receiving a second request from the client for the resource over the secure socket; and
providing the requested resource to the client over the secure socket.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure resource enforcer is configured to identify and provide selected secure resources. The secure resource enforcer includes a determining module configured to determine whether a resource of a web page that is requested in a first request by a client computer requires a secure connection based on a type of the resource that is requested. The secure resource enforcer also includes a redirecting module configured to redirect the client computer to a secure socket for the resource when the resource requires the secure connection. The secure resource enforcer further includes a receiving module configured to receive a second request from the client for the resource over the secure socket and a secure resource providing module configured to provide the requested resource to the client over the secure socket.
20 Citations
15 Claims
-
1. A computer readable medium having instructions stored thereon that, when executed by a processor, cause the processor to perform a process that identifies and provides selected secure resources, the process comprising:
-
determining whether a resource of a web page that is requested in a first request by a client computer requires a secure connection based on a type of the resource that is requested; redirecting the client computer to a secure socket for the resource when the resource requires the secure connection; receiving a second request from the client for the resource over the secure socket; and providing the requested resource to the client over the secure socket. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A secure resource enforcer configured to identify and provide selected secure resources, comprising:
-
a determining module configured to determine whether a resource of a web page that is requested in a first request by a client computer requires a secure connection based on a type of the resource that is requested; a redirecting module configured to redirect the client computer to a secure socket for the resource when the resource requires the secure connection; a receiving module configured to receive a second request from the client for the resource over the secure socket; and a secure resource providing module configured to provide the requested resource to the client over the secure socket. - View Dependent Claims (9, 10)
-
-
11. A computer-implemented method that identifies and provides selected secure resources, comprising:
-
receiving a first request from a client computer for a resource listed in a single HTML web file over a non-secure socket; determining whether the resource requires a secure connection based on a type of the resource that the client computer requested; when the resource requires the secure connection, redirecting the client computer to a secure socket, receiving a second request from the client computer for the resource over the secure socket and providing the requested resource to the client computer over the secure socket; and when the resource does not require the secure connection, providing the non-resource to the client computer over the non-secure socket. - View Dependent Claims (12, 13)
-
-
14. A computer readable medium having instructions stored thereon that, when executed by a processor, cause the processor to perform a process that identifies and provides selected non-secure resources, the process comprising:
-
receiving a first request from a client computer for a resource of a web page over a secure socket; determining that the resource does not require a secure connection based on a type of the resource that is requested; redirecting the client computer to a non-secure socket for the resource; receiving a second request from the client for the resource over the non-secure socket; and providing the requested resource to the client over the non-secure socket. - View Dependent Claims (15)
-
Specification