METHODS AND SYSTEMS FOR VERIFYING THE SECURITY LEVEL OF WEB CONTENT THAT IS EMBEDDED WITHIN A MOBILE APPLICATION AND THE IDENTITY OF WEB APPLICATION OWNERS FIELD OF THE DISCLOSURE
First Claim
1. A computer-implemented method, the method implemented using a computer device coupled to a memory device, the method comprising:
- determining when a mobile application that is not a browser and is on a computer device coupled to a memory device has accessed or is trying to access content from the internet that is to be embedded or incorporated into the mobile application that is not a browser;
determining whether or not the content that is to be embedded or incorporated into the mobile application has accessed or is trying to access is safe or unsafe;
notifying the user of the application or causing the mobile application to notify the user of the application that the content that the mobile application has accessed or is trying to access is safe or unsafe; and
preventing the user of the application from accessing the content from the internet if that content is determined to be unsafe.
1 Assignment
0 Petitions
Accused Products
Abstract
The present disclosure discloses a method of allowing WebView to verify the security level of a web content and inform the user with regards to the security and blocks web contents that are determined harmful or inappropriate. In one embodiment of the present disclosure, the WebView checks a trusted data source to see if the visited web content has been labeled or flagged as safe or unsafe by initiating a connection to a trusted third-party database using a to determine whether or not the URL is associated with a domain that has been classified or labeled as safe or unsafe. The WebView then informs the user about the security level of the web content through a visual indicator or it can redirect the user to a warning page explaining why access to the site is prohibited, or it can block access without warning.
-
Citations
14 Claims
-
1. A computer-implemented method, the method implemented using a computer device coupled to a memory device, the method comprising:
-
determining when a mobile application that is not a browser and is on a computer device coupled to a memory device has accessed or is trying to access content from the internet that is to be embedded or incorporated into the mobile application that is not a browser; determining whether or not the content that is to be embedded or incorporated into the mobile application has accessed or is trying to access is safe or unsafe; notifying the user of the application or causing the mobile application to notify the user of the application that the content that the mobile application has accessed or is trying to access is safe or unsafe; and preventing the user of the application from accessing the content from the internet if that content is determined to be unsafe. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer system comprising:
- a processor; and
a computer-readable storage device having encoded thereon computer-executable instructions that are executable by the processor to perform functions comprising;receiving a message or instruction indicating a mobile application on a computer device coupled to a memory device has accessed or is trying to access content from the internet that is to be embedded or incorporated into the mobile application that is not a browser; receiving a message or instruction indicating whether or not the content that is to embedded or incorporated into the mobile application that is not a browser and that the mobile application has accessed or is trying to access is safe or unsafe; sending a message or instruction indicating that the content that the mobile application has accessed or is trying to access is safe or unsafe; and sending a message or instruction that prevents the user of the application from accessing the content from the internet if that content is determined to be unsafe. - View Dependent Claims (9, 10, 11, 12, 13, 14)
- a processor; and
Specification