METHODS AND APPARATUS FOR BLOCKING USAGE TRACKING
First Claim
1. A machine-readable non-transitory storage medium having instructions therein, which when executed by a machine, causes the machine to perform a method, the method comprising:
- maintaining one or more data stores capable of storing local data in a device for loading a resource of a domain, the loading of the resource to cause one or more data access operations on the data stores, wherein access to usage tracking data of the device from the domain depends on at least one of the data access operations;
configuring the data access operations to block the usage tracking data of the device from the domain; and
performing the data access operations on the data stores for the loading of the resource, wherein the resource is successfully loaded for a presentation of a web page to a user.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatuses that maintain one or more data stores capable of storing local data in a device for loading a resource of a domain are described. The resource may be loaded to cause one or more data access operations on the data stores. Access to usage tracking data of the device from the domain may depend on at least one of the data access operations. The data access operations may be configured to block the usage tracking data of the device from the domain. The data access operations may be performed on the data stores for the loading of the resource. A web page may be presented to a user when the resource is successfully loaded.
115 Citations
30 Claims
-
1. A machine-readable non-transitory storage medium having instructions therein, which when executed by a machine, causes the machine to perform a method, the method comprising:
-
maintaining one or more data stores capable of storing local data in a device for loading a resource of a domain, the loading of the resource to cause one or more data access operations on the data stores, wherein access to usage tracking data of the device from the domain depends on at least one of the data access operations; configuring the data access operations to block the usage tracking data of the device from the domain; and performing the data access operations on the data stores for the loading of the resource, wherein the resource is successfully loaded for a presentation of a web page to a user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A machine-readable non-transitory storage medium having instructions therein, which when executed by a machine, causes the machine to perform a method, the method comprising:
-
identifying a plug-in module for loading a resource of a third party domain, wherein the third party domain is of a third party type with respect to a first party resource of a first party domain loaded in a device; configuring the plug-in module to block usage tracking on the device from the third party domain; and invoking the plug-in module for the loading of the resource, wherein the resource is successfully loaded for a presentation of the first party resource to a user. - View Dependent Claims (17, 18, 19)
-
-
20. A machine-readable non-transitory storage medium having instructions therein, which when executed by a machine, causes the machine to perform a method, the method comprising:
-
in response to a request for a resource of a third party domain, identifying a first party domain for the third party domain, wherein the request is caused by a loaded resource of the first party domain, and wherein the third party domain is transparent to a user of a device; querying a cache of the device for the resource under the first party domain, wherein resources of the third party domain in the cache under a separate first party domain are inaccessible for the querying under the first party domain; and loading the resource under the first party domain from the cache if the querying is successful, wherein the loading prevents usage tracking from the third party domain via the cache. - View Dependent Claims (21, 22)
-
-
23. A machine-readable non-transitory storage medium having instructions therein, which when executed by a machine, causes the machine to perform a method, the method comprising:
-
maintaining one or more blacklists of known trackers in a device, wherein each known tracker addresses resources of a domain capable of tracking usage of the device; monitoring a history of third party requests for resources of third party domains, each third party request caused transparently to a user of the device via a loaded resource in the device, the loaded resource being of a first party domain specified in a request from the user; presenting a user interface indicating usage tracking activities according to the history, wherein the usage tracking activities indicating relationships between the first party domains and the blacklists via the third party domains. - View Dependent Claims (24, 25, 26, 27, 28)
-
-
29. A computer implemented method comprises:
-
maintaining one or more data stores capable of storing local data in a device for loading a resource of a domain, the loading of the resource to cause one or more data access operations on the data stores, wherein access to usage tracking data of the device from the domain depends on at least one of the data access operations; configuring the data access operations to block the usage tracking data of the device from the domain; and performing the data access operations on the data stores for the loading of the resource, wherein the resource is successfully loaded for a presentation of a web page to a user.
-
-
30. A computer system comprising:
-
a memory storing executable instructions; a network interface coupled to sources of one or more domains including third party domains and first party domains according to requests from a user of the system; a processor coupled to the memory and the network interface to execute the instructions from the memory, the processor being configured to maintain at least one blacklist of known trackers in a device, wherein each known tracker addresses resources of a domain capable of tracking usage of the system, monitor a history of third party requests for resources of the third party domains, each third party request caused transparently to the user via a loaded resource in the system, the loaded resource being of one of the first party domains specified in one of the requests; present a user interface indicating usage tracking activities according to the history, wherein the usage tracking activities identifying relationships between the first party domains and the at least one blacklist via the third party domains.
-
Specification