Virtual sandboxing for supplemental content
First Claim
1. A computer-implemented method of managing behavior of supplemental content in an electronic environment, comprising:
- under control of one or more computer systems configured with executable instructions,receiving, at a resource provider, a request from a browser application, executing on a client device, to a content publisher;
in response to the request, providing to the client device a response including code for a page to be rendered by the browser application, the page including primary content corresponding to the request and an identifier for a rule set corresponding to the page, the rule set including rules defining at least one of allowed activities or prohibited activities for supplemental content displayed or executed on the page, the supplemental content originating from a source other than the content publisher,wherein the identifier is configured to provide access to the rule set, the rule set managed by a source external to the client device, andwherein behavior of the supplemental content loaded for the page is capable of being monitored to ensure that the behavior complies with the rules of the rule set corresponding to the page; and
performing, by the resource provider, one or more actions with respect to the supplemental content in response to detecting monitored behavior of the supplemental content that violates at least one of the rules in the rule set.
1 Assignment
0 Petitions
Accused Products
Abstract
A virtual sandbox environment enables a publisher to enforce rules for supplemental content, such as third party advertising, displayed on a page or other grouping of content from the publisher. One or more rule sets can be applied or enforced in a number of ways, such as through active script on a page, as part of a browser or other such application or interface, or via a third party such as an anti-virus application or service. A rule set can specify behavior that is allowed or prohibited, in various circumstances, as well as actions to be taken in response to any unapproved or prohibited behavior. Rule sets can be cached by a client device such that any number of pages or other groupings of content can utilize the same rule set without reloading the set.
-
Citations
25 Claims
-
1. A computer-implemented method of managing behavior of supplemental content in an electronic environment, comprising:
under control of one or more computer systems configured with executable instructions, receiving, at a resource provider, a request from a browser application, executing on a client device, to a content publisher; in response to the request, providing to the client device a response including code for a page to be rendered by the browser application, the page including primary content corresponding to the request and an identifier for a rule set corresponding to the page, the rule set including rules defining at least one of allowed activities or prohibited activities for supplemental content displayed or executed on the page, the supplemental content originating from a source other than the content publisher, wherein the identifier is configured to provide access to the rule set, the rule set managed by a source external to the client device, and wherein behavior of the supplemental content loaded for the page is capable of being monitored to ensure that the behavior complies with the rules of the rule set corresponding to the page; and performing, by the resource provider, one or more actions with respect to the supplemental content in response to detecting monitored behavior of the supplemental content that violates at least one of the rules in the rule set. - View Dependent Claims (2, 3)
-
4. A computer-implemented method of managing behavior of supplemental content, comprising:
under control of one or more computer systems configured with executable instructions, receiving, at a resource provider, a request for primary content; and in response to the request, providing the primary content and an identifier for a rule set, the rule set including rules specifying at least one of allowed activities and or prohibited activities for supplemental content executed with the primary content, the supplemental content originating from an external provider other than a publisher of the primary content, wherein the identifier is configured to enable access to the rule set, the rule set managed by a source external to a client device receiving the primary content, wherein behavior of the supplemental content is capable of being monitored to ensure that the behavior complies with the rules of the rule set; and wherein an action is to be performed by the resource provider with respect to the supplemental content when the supplemental content requests an activity that violates the rule set. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
16. A computer-implemented method of managing behavior of supplemental content, comprising:
under control of one or more computer systems configured with executable instructions, monitoring, by a resource provider, behavior of primary content and supplemental content in at least one application, the primary content originating from a publisher and the supplemental content originating from a source other than the publisher; determining at least one rule set associated with the primary content being executed or displayed in the at least one application, the rule set defining at least one of allowable or prohibited behavior of the supplemental content when executed or displayed via the primary content, wherein the rule set is configured to be managed by a source external to a client device, the client device configured to execute the at least one application; and in response to detecting monitored behavior of the supplemental content that violates the rule set, performing, by the resource provider, at least one action with respect to the supplemental content. - View Dependent Claims (17)
-
18. A system for managing behavior of supplemental content, comprising:
-
a processor; a memory device including instructions that, when executed by the processor, cause the processor to; receive, at a resource provider, a request for primary content; in response to the request, provide the primary content and an identifier for a rule set, the rule set including rules specifying at least one of allowed activities or prohibited activities for supplemental content executed with the primary content, the supplemental content originating from an external provider other than a publisher of the primary content, wherein the identifier is configured to enable access to the rule set, the rule set managed by a source external to a client device receiving the primary content, and wherein behavior of the supplemental content is capable of being monitored to ensure that the behavior complies with the rules of the rule set; and perform, by the resource provider, at least one action with respect to the supplemental content in response to detecting any monitored behavior of the supplemental content that violates the rule set. - View Dependent Claims (19, 20, 21)
-
-
22. A non-transitory computer-readable storage medium including instructions for managing behavior of supplemental content, the instructions when executed by a processor causing the processor to:
-
receive, at a resource provider, a request for primary content; and in response to the request, provide the primary content and an identifier for a rule set, the rule set including rules specifying at least one of allowed activities or prohibited activities for supplemental content executed with the primary content, the supplemental content originating from an external provider other than a publisher of the primary content, wherein the identifier is configured to enable access to the rule set, the rule set managed by a source external to a client device receiving the primary content, wherein behavior of the supplemental content is capable of being monitored to ensure that the behavior complies with the rules of the rule set, wherein at least one responsive action is designated to be performed by the resource provider with respect to the supplemental content in response to detecting monitored behavior of the supplemental content that violates the rule set. - View Dependent Claims (23, 24, 25)
-
Specification