Selective disabling of content portions
First Claim
1. A system for protecting a client computing device from harmful network resources, the system comprising:
- one or more computer processors;
a computer memory accessible by at least one of the one or more computer processors; and
a network computing component comprising an executable software module in the computer memory, the executable software module executed by the one or more computer processors, wherein the network computing component is configured to perform operations comprising;
hosting an instance of a browsing application, the instance of the browsing application in communication with a browsing application of a client computing device;
obtaining a network resource from one or more content sources, the network resource comprising a plurality of portions of source code;
determining that a first portion of source code is identified as harmful;
in response to determining that the first portion of source code is identified as harmful, modifying the network resource, wherein modifying the network resource comprises;
generating a visual representation of a harmful network resource referenced in the first portion of source code,disabling, in the first portion of source code, a reference to the harmful network resource, andinserting, into the first portion of source code, a reference to the generated visual representation of the harmful network resource; and
providing, to the browsing application of the client computing device, the modified network resource.
1 Assignment
0 Petitions
Accused Products
Abstract
Features are described for detecting and disabling potentially harmful items that are embedded within or referenced by network resources such as web pages. A network node, remote from a user'"'"'s computing device, can compare content portions to a repository of content portions which are known to be harmful, or to a blacklist of resources which are known to be harmful. The network node can take preventative actions based on the nature of the threat and the nature of the resource. For example, the network node can modify or remove portions of source code, replace interactive content with static images, and/or disable objects. Other features include providing users with a mechanism to override the preventative measures and receive the original unprocessed content. The network node can monitor the user overrides and fine tune its detection of harmful content.
-
Citations
26 Claims
-
1. A system for protecting a client computing device from harmful network resources, the system comprising:
-
one or more computer processors; a computer memory accessible by at least one of the one or more computer processors; and a network computing component comprising an executable software module in the computer memory, the executable software module executed by the one or more computer processors, wherein the network computing component is configured to perform operations comprising; hosting an instance of a browsing application, the instance of the browsing application in communication with a browsing application of a client computing device; obtaining a network resource from one or more content sources, the network resource comprising a plurality of portions of source code; determining that a first portion of source code is identified as harmful; in response to determining that the first portion of source code is identified as harmful, modifying the network resource, wherein modifying the network resource comprises; generating a visual representation of a harmful network resource referenced in the first portion of source code, disabling, in the first portion of source code, a reference to the harmful network resource, and inserting, into the first portion of source code, a reference to the generated visual representation of the harmful network resource; and providing, to the browsing application of the client computing device, the modified network resource. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer-implemented method comprising:
-
hosting an instance of a browsing application, the instance of the browsing application in communication with a browsing application of a client computing device; obtaining a network resource from one or more content sources, the network resource comprising a plurality of portions of source code; determining that a first portion of source code, of the plurality of portions of source code, is identified as harmful; in response to determining that the first portion of source code is identified as harmful, modifying the network resource, wherein modifying the network resource comprises generating a visual representation of a harmful network resource referenced in the first portion of source code, disabling, in the first portion of source code, a reference to the harmful network resource, and inserting, into the first portion of source code, a reference to the generated visual representation of the harmful network resource; and providing, to the browsing application of the client computing device, the modified network resource, wherein the method is performed by a network computing component comprising hardware. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system for overriding protective measures applied to network resources, the system comprising:
-
a network computing component comprising hardware, the network computing component operable to; provide, to a client device, a network resource comprising a plurality of portions of source code, wherein a portion identified as harmful is modified, and wherein modifying the identified portion comprises; generating a visual representation of a harmful network resource referenced in the portion, disabling a reference to the harmful network resource, and including reference to the generated visual representation of the harmful network resource; receive, from the client device, override data, wherein the override data comprises a request from a user of the client device to receive an unmodified version of the modified portion; and provide, to the client device, the unmodified version. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A non-transitory computer storage medium that stores an executable browser component that directs a user computing device to perform a process that comprises:
-
transmitting, to a proxy server, a request for a content page; receiving from the proxy server a modified version of the content page with metadata reflective of how the content page was modified by the proxy server, the modified version including a modified portion of source code identified by the proxy server as harmful, wherein the metadata identifies one or more modifications of the portion of source code including; a reference to a visual representation, generated by the proxy server and stored on the proxy server, of a harmful network resource, referenced in an unmodified version of the portion, was inserted in the portion, and a reference to the harmful network resource was disabled; and displaying the modified version of the content page on the user computing device together with a selectable user option to initiate retrieval of the portion identified as harmful, the user option displayed in response to the metadata. - View Dependent Claims (22, 23, 24, 25, 26)
-
Specification