Access to network content
First Claim
Patent Images
1. A method, comprising:
- preloading, using a processor, a set of network content in a hidden browser instance, the set of network content configured in a first security state;
determining that the set of network content has entered a second security state different from the first security state; and
reloading the set of network content into the hidden browser instance in response to the determination that the set of network content has entered the second security state, wherein the reloading operation configures the set of network content to operate in the second security state.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for improving access to search results are provided in the disclosure herein. Aspects of this disclosure minimize the delay in accessing network content by priming certain regularly viewed content (e.g., a search engine home page or a web search page) in a hidden browser instance. As the user accesses the content prerendered in the invisible browser instance, a new instance of the prerendered content is created to facilitate future accesses to the network content (e.g., future search queries). The security state of the network content may be determined and/or monitored, and appropriate action taken in response to a change in the security state.
-
Citations
22 Claims
-
1. A method, comprising:
-
preloading, using a processor, a set of network content in a hidden browser instance, the set of network content configured in a first security state; determining that the set of network content has entered a second security state different from the first security state; and reloading the set of network content into the hidden browser instance in response to the determination that the set of network content has entered the second security state, wherein the reloading operation configures the set of network content to operate in the second security state. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A tangible, non-transitory computer readable storage medium comprising instructions that, when executed by a processor, perform a method, the method comprising:
-
preloading a set of network content in a hidden browser instance, the set of network content configured in a first security state; determining that the set of network content has entered a second security state with different from the first security state; and reloading the set of network content into the hidden browser instance in response to the determination that the set of network content has entered the second security state, wherein the reloading operation configures the set of network content to operate in the second security state. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A processing system, comprising:
-
at least one processor coupled to a memory, the at least one processor being configured to; preload a set of network content in a hidden browser instance, the set of network content configured in a first security state; determine that the set of network content has entered a second security state different from the first security state; and reload the set of network content into the hidden browser instance in response to the determination that the set of network content has entered the second security state, wherein the reloading operation configures the set of network content to operate in the second security state. - View Dependent Claims (21, 22)
-
Specification