REMOTE BROWSING SESSION MANAGEMENT
First Claim
1. A computer-implemented method comprising:
- as implemented by a network computing provider comprising one or more computing devices configured to execute specific instructions,receiving a first encrypted communication from a client computing device, the first encrypted communication comprising an encrypted request for a network resource;
decrypting the first encrypted communication to recover the request for the network resource;
encrypting the request for the network resource to create a second encrypted communication, the second encrypted communication encrypted with a different key than the first encrypted communication; and
transmitting the second encrypted communication to a content source.
0 Assignments
0 Petitions
Accused Products
Abstract
A browsing process is directed to the generation and management of a browse session at a network computing provider. A client computing device transmits secure requests for network resources to a network computing provider. The network computing provider comprises one or more virtual network computing providers for processing secure communications between a client computing device and a content source. A virtual network computing provider handles the secure communications, decrypting and processing the communications while preventing third parties from accessing the unencrypted communication data. The virtual network computing provider may determine a browse configuration identifying processing actions to perform on the request content. The virtual network computing provider may retrieve the requested content, perform a first set of processing actions to generate a processing result, and provide the processing result to the client computing device, which may perform a second set of processing actions, including display.
28 Citations
20 Claims
-
1. A computer-implemented method comprising:
as implemented by a network computing provider comprising one or more computing devices configured to execute specific instructions, receiving a first encrypted communication from a client computing device, the first encrypted communication comprising an encrypted request for a network resource; decrypting the first encrypted communication to recover the request for the network resource; encrypting the request for the network resource to create a second encrypted communication, the second encrypted communication encrypted with a different key than the first encrypted communication; and transmitting the second encrypted communication to a content source. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A system comprising:
-
a computer-readable memory storing executable instructions; and one or more computer processors in communication with the computer-readable memory, the one or more computer processors programmed by the executable instructions to at least; receive a first encrypted network resource request from a client computing device, the first encrypted network resource request comprising a request for a network resource hosted by a remote content source; decrypt the first encrypted network resource request using a first decryption key to obtain the request for the network resource, wherein the first decryption key corresponds to a first encryption key used to encrypt the first encrypted network resource request; generate a second encrypted network resource request using a second encryption key different than the first encryption key; and obtain the network resource from the remote content source using the second encrypted network resource request. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. Non-transitory computer storage having stored thereon executable code configured to execute a process on a server system, the process comprising:
-
receiving an encrypted request from a client-side browser application executing remotely from the server system, wherein the encrypted request comprises a request for a network resource hosted by a content provider separate from the server system; decrypting the first encrypted communication to recover the request for the network resource; encrypting the request for the network resource to create a second encrypted communication, the second encrypted communication encrypted with a different key than the first encrypted communication; and transmitting the second encrypted communication, comprising the request for the network resource, to the content source to obtain the network resource on behalf of the client computing device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification