Enhanced browser security
First Claim
1. A computer implemented method for customizing security policy settings in a browser application that will be applied to domain identifiers corresponding to websites, the method comprising:
- displaying, by a computing device, a user interface to customize the security policy settings in the browser application, wherein the user interface enables a user to send a first request to update a first set of domain identifiers that correspond to a first set of websites that populate a first security-context zone of the browser application, wherein the first security-context zone is associated with a first security policy;
in response to receiving the first request, comparing the first set of domain identifiers that populate the first security-context zone with a second set of domain identifiers that correspond to a second set of websites;
presenting, on the user interface, a list of domain name identifiers found within the second set of domain identifiers that are not currently found within the first set of domain identifiers that populate the first security-context zone;
populating the first security-context zone with at least one identifier found within the second set of identifiers that is not included in the first set of domain identifiers;
displaying the user interface, wherein the user interface enables a user to send a second request to update a third set of domain identifiers that correspond to websites that populate a second security-context zone of the browser application, wherein the second security-context zone is associated with a second security policy;
in response to receiving a second request, comparing the third set of domain identifiers that populate the second security-context zone with a fourth set of domain identifiers corresponding to a third set of websites;
presenting, on the user interface, a list of domain name identifiers found within the fourth set of domain identifiers that are not currently found within the third set of domain identifiers that populate the second security-context zone; and
populating the second security-context zone with at least one identifier found within the fourth set of domain identifiers that is not included in the third set of domain identifiers,wherein the first security policy is more restrictive than the second security policy.
3 Assignments
0 Petitions
Accused Products
Abstract
A machine-executable method implementable in a system operable to execute a browser application having at least one security-context zone and operable to apply at least one security policy to interaction between the system and web sites corresponding to domain identifiers populating the at least one security-context zone includes comparing a first set of domain identifiers populating a first security-context zone of the at least one security-context zone with a second set of domain identifiers. The method further includes populating the first security-context zone with at least one second-set identifier not included in the first set of domain identifiers.
80 Citations
8 Claims
-
1. A computer implemented method for customizing security policy settings in a browser application that will be applied to domain identifiers corresponding to websites, the method comprising:
-
displaying, by a computing device, a user interface to customize the security policy settings in the browser application, wherein the user interface enables a user to send a first request to update a first set of domain identifiers that correspond to a first set of websites that populate a first security-context zone of the browser application, wherein the first security-context zone is associated with a first security policy; in response to receiving the first request, comparing the first set of domain identifiers that populate the first security-context zone with a second set of domain identifiers that correspond to a second set of websites; presenting, on the user interface, a list of domain name identifiers found within the second set of domain identifiers that are not currently found within the first set of domain identifiers that populate the first security-context zone; populating the first security-context zone with at least one identifier found within the second set of identifiers that is not included in the first set of domain identifiers; displaying the user interface, wherein the user interface enables a user to send a second request to update a third set of domain identifiers that correspond to websites that populate a second security-context zone of the browser application, wherein the second security-context zone is associated with a second security policy; in response to receiving a second request, comparing the third set of domain identifiers that populate the second security-context zone with a fourth set of domain identifiers corresponding to a third set of websites; presenting, on the user interface, a list of domain name identifiers found within the fourth set of domain identifiers that are not currently found within the third set of domain identifiers that populate the second security-context zone; and populating the second security-context zone with at least one identifier found within the fourth set of domain identifiers that is not included in the third set of domain identifiers, wherein the first security policy is more restrictive than the second security policy. - View Dependent Claims (2, 3, 4)
-
-
5. A computer system for customizing security policy settings in a browser application that will be applied to domain identifiers corresponding to websites, the system comprising:
-
a computer processor; and a memory storing computer-executable instructions that when executed by the computer processor, cause the computer processor to perform steps of; displaying a user interface to customize the security policy settings in the browser application, wherein the user interface enables a user to send a first request to update a first set of domain identifiers that correspond to a first set websites that populate a first security-context zone of the browser application, wherein the first security-context zone is associated with a first security policy; in response to receiving the first request, comparing the first set of domain identifiers that populate the first security-context zone with a second set of domain identifiers that correspond to a second set of websites; presenting, on the user interface, a list of domain name identifiers found within the second set of domain identifiers that are not currently found within the first set of domain identifiers that populate the first security-context zone; populating the first security-context zone with at least one identifier found within the second set of identifiers that is not included in the first set of domain identifiers; displaying the user interface, wherein the user interface enables a user to send a second request to update a third set of domain identifiers that correspond to websites that populate a second security-context zone of the browser application, wherein the second security-context zone is associated with a second security policy; in response to receiving a second request, comparing the third set of domain identifiers that populate the second security-context zone with a fourth set of domain identifiers corresponding to a third set of websites; presenting, on the user interface, a list of domain name identifiers found within the fourth set of domain identifiers that are not currently found within the third set of domain identifiers that populate the second security-context zone; and populating the second security-context zone with at least one identifier found within the fourth set of domain identifiers that is not included in the third set of domain identifiers, wherein the first security policy is more restrictive than the second security policy.
-
-
6. A non-transitory computer-readable storage medium storing computer-executable instructions for customizing security policy settings in a browser application that will be applied to domain identifiers corresponding to websites that, when executed in a computing system, perform steps of:
-
displaying a user interface to customize the security policy settings in the browser application, wherein the user interface enables a user to send a first request to update a first set of domain identifiers that correspond to a first set websites that populate a first security-context zone of the browser application, wherein the first security-context zone is associated with a first security policy; in response to receiving the first request, comparing the first set of domain identifiers that populate the first security-context zone with a second set of domain identifiers that correspond to a second set of websites; presenting, on the user interface, a list of domain name identifiers found within the second set of domain identifiers that are not currently found within the first set of domain identifiers that populate the first security-context zone; populating the first security-context zone with at least one identifier found within the second set of identifiers that is not included in the first set of domain identifiers; displaying the user interface, wherein the user interface enables a user to send a second request to update a third set of domain identifiers that correspond to websites that populate a second security-context zone of the browser application, wherein the second security-context zone is associated with a second security policy; in response to receiving a second request, comparing the third set of domain identifiers that populate the second security-context zone with a fourth set of domain identifiers corresponding to a third set of websites; presenting, on the user interface, a list of domain name identifiers found within the fourth set of domain identifiers that are not currently found within the third set of domain identifiers that populate the second security-context zone; and populating the second security-context zone with at least one identifier found within the fourth set of domain identifiers that is not included in the third set of domain identifiers, wherein the first security policy is more restrictive than the second security policy. - View Dependent Claims (7, 8)
-
Specification