Secure web container for a secure online user environment
First Claim
1. A secure system providing an interaction with a user through a local client machine, the secure system for providing a secure application programming interface, the system comprising:
- a microprocessor;
a non-transitory computer readable medium storing instructions that, when executed by the microprocessor, generate an application programming interface (API), wherein the API is operable to validate an API call received from a requesting party application of a requesting party application provider,andwherein the API is operable, in response to the API call, to invoke a secure web container in a private user area external to the local client machine such that a display is provided at the local client machine without receiving web code commands from a third-party online service provider'"'"'s site;
wherein the display comprises image representations of the requesting party application web content to a user of the requesting party application without transmitting web code commands to the local client machine;
andwherein the private user area is established and disposed of, thereby protecting user data from unauthorized access.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for invocation of a secure web container which may display data representative of a requesting party'"'"'s application at a user'"'"'s machine. The secure web container is invoked upon receipt of an API call from the requesting party. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable web container), insulating the user and requesting parties from the threats associated with being online for the purposes of providing secure, policy-based interaction with a requesting party'"'"'s online services.
27 Citations
22 Claims
-
1. A secure system providing an interaction with a user through a local client machine, the secure system for providing a secure application programming interface, the system comprising:
-
a microprocessor; a non-transitory computer readable medium storing instructions that, when executed by the microprocessor, generate an application programming interface (API), wherein the API is operable to validate an API call received from a requesting party application of a requesting party application provider, and wherein the API is operable, in response to the API call, to invoke a secure web container in a private user area external to the local client machine such that a display is provided at the local client machine without receiving web code commands from a third-party online service provider'"'"'s site; wherein the display comprises image representations of the requesting party application web content to a user of the requesting party application without transmitting web code commands to the local client machine; and wherein the private user area is established and disposed of, thereby protecting user data from unauthorized access. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for providing images through a secure application programming interface, the method comprising:
-
receiving an application programming interface (API) call from a requesting party application of a requesting party application provider; validating the API call received; invoking, in response to the API call, a secure web container in a private user area external to a local client machine such that a display is provided at the local client machine without receiving web code commands from a third-party online service provider'"'"'s site; displaying image representations of the requesting party application web content to a user of the requesting party application without transmitting web code commands to the local client machine; and wherein the private user area is established and disposed of, thereby protecting user data from unauthorized access. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification