CLOUD-ASSISTED METHOD AND SERVICE FOR APPLICATION SECURITY VERIFICATION
First Claim
1. A cloud server system for generating a security recommendation for a browser-based application, the cloud server comprising:
- a communication module to receive an application verification request from a client computing device;
a source authentication module to (i) receive application source data that identifies a source of the browser-based application, (ii) retrieve source authentication data; and
(iii) authenticate the source as a function of the application source data and the source authentication data;
an application verification module to (i) retrieve application validation data and (ii) verify the browser-based application as a function of the application validation data; and
a recommendation engine to generate a security recommendation in response to the authentication of the source authentication module and the verification of the application verification module;
wherein the communication module further to transmit the security recommendation to the client computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, device, and system for browser-based application security verification is disclosed. A client device requests a browser-based application from a web server. An application security module of the client device intervenes and transmits an application verification request to a cloud service system. The cloud service system retrieves data regarding the security of the application and source from cloud resources and a local database of the cloud server. The cloud service system then uses the data to authenticate the source and verify the security of the browser-based application. The cloud service system provides the client device with a recommendation regarding the security of the browser-based application and updates its local database. The client device may then consider the recommendation in determining whether to download or execute the browser-based application and provide feedback to the cloud service system. The client device may also perform a local security analysis after receiving the cloud service system'"'"'s recommendation.
-
Citations
26 Claims
-
1. A cloud server system for generating a security recommendation for a browser-based application, the cloud server comprising:
-
a communication module to receive an application verification request from a client computing device; a source authentication module to (i) receive application source data that identifies a source of the browser-based application, (ii) retrieve source authentication data; and (iii) authenticate the source as a function of the application source data and the source authentication data; an application verification module to (i) retrieve application validation data and (ii) verify the browser-based application as a function of the application validation data; and a recommendation engine to generate a security recommendation in response to the authentication of the source authentication module and the verification of the application verification module; wherein the communication module further to transmit the security recommendation to the client computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A client computing device for verifying the security of a browser-based application, the client computing device comprising:
-
an application security module to (i) determine whether the client computing device has requested the browser-based application and (ii) in response to determining that the browser-based application has been requested, transmit an application verification request to a cloud service system to verify the security of the browser-based application; and a communication module to receive a security recommendation from the cloud service system ; wherein the application security module further to perform a security action in response to the security recommendation. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. One or more machine-readable storage media comprising a plurality of instructions stored thereon that, in response to being executed, result in a computing device:
-
receiving a browser-based application and application source data that identifies a source of the browser-based application; retrieving source authentication data and application validation data; authenticating the source as a function of the application source data and the source authentication data; verifying the security of the browser-based application as a function of the application validation data; generating a security recommendation as a function of authenticating the source and verifying the browser-based application; and transmitting the security recommendation to a remote computing device. - View Dependent Claims (24, 25, 26)
-
Specification