ENHANCED BROWSER SECURITY
0 Assignments
0 Petitions
Accused Products
Abstract
A machine-executable method implementable in a system operable to execute a browser application having at least one security-context zone and operable to apply at least one security policy to interaction between the system and web sites corresponding to domain identifiers populating the at least one security-context zone includes comparing a first set of domain identifiers populating a first security-context zone of the at least one security-context zone with a second set of domain identifiers. The method further includes populating the first security-context zone with at least one second-set identifier not included in the first set of domain identifiers.
13 Citations
41 Claims
-
1-21. -21. (canceled)
-
22. A method for enhancing browser security, the method comprising:
-
receiving a first request to update a first set of domain identifiers associated with a first security-context of a browser, the first security-context being associated with at least a first security policy; responsive to the first request, comparing the first set of domain identifiers with a second set of domain identifiers and updating the first set of domain identifiers to include at least one domain identifier in the second set that is not already in the first set of domain identifiers; receiving a second request to update a third set of domain identifiers associated with a second security-context of the browser, the second security-context being associated with at least a second security policy; responsive to the second request, comparing the third set of domain identifiers with a fourth set of domain identifiers and updating the third set of domain identifiers to include at least one domain identifier in the fourth set that is not already in the third set of domain identifiers; and providing data for presentation by the browser in accordance with at least one of the first security-context and the second security-context, wherein the first security policy is more restrictive than the second security policy. - View Dependent Claims (23, 24, 25, 26, 27, 28)
-
-
29. A method for enhancing browser security, the method comprising:
-
receiving a first request to update a first set of domain identifiers associated with a first security-context of a first browser, the first security-context being associated with at least a first security policy; responsive to the first request, sending a second request to obtain a second set of domain identifiers associated with the first security-context of the first browser; responsive to the second request, receiving the second set of domain identifiers, the second set of domain identifiers including at least one domain identifier submitted for review by a browser user; responsive to receiving the second set of domain identifiers, comparing the first set of domain identifiers with the second set of domain identifiers and updating the first set of domain identifiers to include at least one domain identifier in the second set that is not already in the first set of domain identifiers; and providing data for presentation by the first browser in accordance with at least the first security-context. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36)
-
-
37. A method for enhancing browser security, the method comprising:
-
receiving a first request to update a first set of domain identifiers associated with a first security-context of a browser, the first security-context being associated with at least a first security policy, the first request including at least one domain identifier to be considered for inclusion in the update; responsive to the first request, sending a second request to obtain a second set of domain identifiers associated with the first security-context of the browser, the second request including said at least one domain identifier to be considered for inclusion in the update; responsive to the second request, receiving the second set of domain identifiers, the second set of domain identifiers including said at least one domain identifier considered and found suitable for inclusion in the update; responsive to receiving the second set of domain identifiers, comparing the first set of domain identifiers with the second set of domain identifiers and updating the first set of domain identifiers to include said at least one domain identifier; and providing data for presentation by the browser in accordance with at least the first security-context. - View Dependent Claims (38, 39, 40, 41)
-
Specification