Web application container for client-level runtime control
First Claim
1. A computing device for establishing client-level web application runtime control, the computing device comprising:
- a browser to receive application code associated with a browser-based application from a web server;
a browser security interface to generate machine-executable code and an access control map for the application code, wherein the access control map is generated as a function of at least one of (i) design time rules for the browser-based application that identify hardware of the computing device that the browser-based application is configured to access or (ii) user configurations for the browser-based application that identify hardware of the computing device that the browser-based application is configured to access; and
a web security module to (i) receive application security information associated with the application code from one or more security applications, (ii) perform a security assessment of the browser-based application as a function of the application security information and the access control map, (iii) establish a client-level web application runtime security policy associated with the browser-based application in response to performing the security assessment, and (iv) enforce the established client-level web application runtime security policy on the computing device,wherein the client-level web application runtime security policy is to identify hardware access rules to be enforced on the computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
Technologies for establishing client-level web application runtime control using a computing device include receiving application code for a browser-based application from a web server and generating machine-executable code and an access control map for the application code. The computing device receives application security information associated with the application code from local and/or remote security applications and performs a security assessment of the application code based on the application security information and the access control map. Further, the computing device establishes a runtime security policy for the browser-based application and enforces that policy.
21 Citations
21 Claims
-
1. A computing device for establishing client-level web application runtime control, the computing device comprising:
-
a browser to receive application code associated with a browser-based application from a web server; a browser security interface to generate machine-executable code and an access control map for the application code, wherein the access control map is generated as a function of at least one of (i) design time rules for the browser-based application that identify hardware of the computing device that the browser-based application is configured to access or (ii) user configurations for the browser-based application that identify hardware of the computing device that the browser-based application is configured to access; and a web security module to (i) receive application security information associated with the application code from one or more security applications, (ii) perform a security assessment of the browser-based application as a function of the application security information and the access control map, (iii) establish a client-level web application runtime security policy associated with the browser-based application in response to performing the security assessment, and (iv) enforce the established client-level web application runtime security policy on the computing device, wherein the client-level web application runtime security policy is to identify hardware access rules to be enforced on the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. One or more non-transitory, machine readable storage media comprising a plurality of instructions stored thereon that, in response to being executed, result in a computing device:
-
receiving application code associated with a browser-based application from a web server; generating machine-executable code for the application code; generating an access control map for the application code as a function of at least one of (i) design time rules for the browser-based application that identify hardware of the computing device that the browser-based application is configured to access or (ii) user configurations for the browser-based application that identify hardware of the computing device that the browser-based application is configured to access; receiving application security information associated with the application code from one or more security applications; performing a security assessment of the browser-based application as a function of the application security information and the access control map; establishing a client-level web application runtime security policy associated with the browser-based application in response to performing the security assessment, the client-level web application runtime security policy identifying hardware access rules; and enforcing the established client-level web application runtime security policy. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for establishing client-level web application runtime control using a computing device, the method comprising:
-
receiving, with the computing device, application code associated with a browser-based application from a web server; generating, on the computing device, machine-executable code for the application code; generating, on the computing device, an access control map for the application code as a function of at least one of (i) design time rules for the browser-based application that identify hardware of the computing device that the browser-based application is configured to access or (ii) user configurations for the browser-based application that identify hardware of the computing device that the browser-based application is configured to access; receiving, with the computing device, application security information associated with the application code from one or more security applications; performing, on the computing device, a security assessment of the browser-based application as a function of the application security information and the access control map; establishing, on the computing device, a client-level web application runtime security policy associated with the browser-based application in response to performing the security assessment, the client-level web application runtime security policy identifying hardware access rules; and enforcing, on the computing device, the established client-level web application runtime security policy. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification