Remote browsing session management
First Claim
1. A system for protecting a client computing device from high risk operations, the system comprising:
- one or more computer processors;
a computer memory accessible by at least one of the one or more computer processors; and
a network computing component comprising an executable software module in the computer memory, the executable software module executed by the one or more computer processors, wherein the network computing component is operable to;
host an instance of a browsing application, the instance of the browsing application in communication with a browsing application of a client computing device;
receive, from the client computing device, a request for a network resource, wherein the request comprises a network address of the network resource;
cause transmission of the request for the network resource to a network resource provider;
obtain a response from the network resource provider, wherein the response comprises the requested network resource; and
determine a probability that processing content associated with the requested network resource will cause a performance of a high risk operation on the client computing device, wherein determining the probability comprises;
processing, in the instance of the browsing application hosted on the network computing component, at least a part of the network resource; and
observing for a signature of high risk activity when processing at least part of the network resource.
1 Assignment
0 Petitions
Accused Products
Abstract
A browsing process is directed to the generation and management of a browse session at a network computing provider. A client computing device requests a remote browse session instance at a network computing provider. The browse session instance may correspond to requested network content. The network computing provider determines a browse configuration. The browse configuration may identify a communication protocol and various processing actions. The network computing provider retrieves the requested content through an instantiated network browse session instance, and performs a first set of processing actions to generate a processing result. The network computing provider determines whether the requested content is likely to perform high risk operations on the client computing device, and notifies the user or transmits a processed representation of the requested content to the user such that the likelihood of high risk operations being performed on the client computing device is reduced.
-
Citations
24 Claims
-
1. A system for protecting a client computing device from high risk operations, the system comprising:
-
one or more computer processors; a computer memory accessible by at least one of the one or more computer processors; and a network computing component comprising an executable software module in the computer memory, the executable software module executed by the one or more computer processors, wherein the network computing component is operable to; host an instance of a browsing application, the instance of the browsing application in communication with a browsing application of a client computing device; receive, from the client computing device, a request for a network resource, wherein the request comprises a network address of the network resource; cause transmission of the request for the network resource to a network resource provider; obtain a response from the network resource provider, wherein the response comprises the requested network resource; and determine a probability that processing content associated with the requested network resource will cause a performance of a high risk operation on the client computing device, wherein determining the probability comprises; processing, in the instance of the browsing application hosted on the network computing component, at least a part of the network resource; and observing for a signature of high risk activity when processing at least part of the network resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented method comprising:
as implemented by a network computing component comprising one or more computing devices, the network computing component hosting an instance of a browsing application in communication with a browsing application of a client computing device, receiving, from the client computing device, a request for a network resource, wherein the request comprises a network address of the network resource; causing transmission of the request for the network resource to a network resource provider; obtaining a response from the network resource provider, wherein the response comprises the requested network resource; and determining that processing content associated with the requested network resource will cause a performance of a high risk operation on the client computing device, wherein the determining comprises; processing, in the instance of the browsing application hosted on the network computing component, at least a part of the network resource; and observing for a signature of high risk activity when processing at least part of the network resource. - View Dependent Claims (16, 17, 18, 19, 20)
-
21. Non-transitory computer storage storing an executable network computing component that, when executed by one or more computing devices, causes the one or more computing devices to perform a process comprising:
-
hosting an instance of a browsing application in communication with a browsing application of a client computing device; receiving, from the client computing device, a request for a network resource, wherein the request comprises a network address of the network resource; causing transmission of the request for the network resource to a network resource provider; obtaining a response from the network resource provider, wherein the response comprises the requested network resource; processing, in the instance of the browsing application hosted on the network computing component, at least a part of the network resource; observing for a signature of high risk activity when processing at least part of the network resource; and responsive to observing the signature of high risk activity, performing a protective action regarding the network resource. - View Dependent Claims (22, 23, 24)
-
Specification