Secure Browsing Via A Transparent Network Proxy
First Claim
1. A system for providing secure browsing via a transparent network proxy, the system comprising:
- a memory that stores instructions;
a processor that executes the instructions to perform operations, the operations comprising;
receiving, from a client, a request to access a resource, wherein the request includes an identifier for locating the resource;
determining if the resource is not trusted based on an analysis of the identifier, wherein the resource is determined to not be trusted if the identifier has been utilized less than a threshold number of times; and
forwarding, if the resource is determined to not be trusted based on the analysis of the identifier, the request to a virtual machine manager for selecting a browser virtual machine from a pool of browser virtual machines, wherein a stream including a rendering of the resource is streamed from the browser virtual machine to the client based on the request, and wherein the rendering of the resource is provided in lieu of the resource.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for providing secure browsing via a transparent network proxy is disclosed. The system may receive, from a client, a request to access a resource. The request may include an identifier that may be utilized to locate the resource. Once the request is received, the system may determine if the resource is not trusted, such as if the identifier is determined to be unknown or suspicious. If the resource is determined to not be trusted by the system, the system may forward the request to a virtual machine manager that may select a browser virtual machine from a pool of browser virtual machines. After the browser virtual machine is selected, the browser virtual machine may stream a rendering of the resource to the client based on the request. The rendering of the resource may be provided in lieu of the actual resource.
47 Citations
20 Claims
-
1. A system for providing secure browsing via a transparent network proxy, the system comprising:
-
a memory that stores instructions; a processor that executes the instructions to perform operations, the operations comprising; receiving, from a client, a request to access a resource, wherein the request includes an identifier for locating the resource; determining if the resource is not trusted based on an analysis of the identifier, wherein the resource is determined to not be trusted if the identifier has been utilized less than a threshold number of times; and forwarding, if the resource is determined to not be trusted based on the analysis of the identifier, the request to a virtual machine manager for selecting a browser virtual machine from a pool of browser virtual machines, wherein a stream including a rendering of the resource is streamed from the browser virtual machine to the client based on the request, and wherein the rendering of the resource is provided in lieu of the resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for providing secure browsing via a transparent network proxy, the method comprising:
-
receiving, from a client, a request to access a resource, wherein the request includes an identifier for locating the resource; determining, by utilizing instructions from memory that are executed by a processor, if the resource is not trusted based on an analysis of the identifier, wherein the resource is determined to not be trusted if the identifier has been utilized less than a threshold number of times; and forwarding, if the resource is determined to not be trusted based on the analysis of the identifier, the request to a virtual machine manager for selecting a browser virtual machine from a pool of browser virtual machines, wherein a stream including a rendering of the resource is streamed from the browser virtual machine to the client based on the request, and wherein the rendering of the resource is provided in lieu of the resource. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable device comprising instructions, which when loaded and executed by a processor, cause the processor to perform operations, the operations comprising:
-
receiving, from a client, a request to access a resource, wherein the request includes an identifier for locating the resource; determining if the resource is not trusted based on an analysis of the identifier, wherein the resource is determined to not be trusted if the identifier has been utilized less than a threshold number of times; and forwarding, if the resource is determined to not be trusted based on the analysis of the identifier, the request to a virtual machine manager for selecting a browser virtual machine from a pool of browser virtual machines, wherein a stream including a rendering of the resource is streamed from the browser virtual machine to the client based on the request, and wherein the rendering of the resource is provided in lieu of the resource. - View Dependent Claims (20)
-
Specification