Server defenses against use of tainted cache
First Claim
1. A method of managing a browser cache operating on a client node connected to a second network, the method comprising:
- receiving a description of an object on a server computing node, the description received by the server computing node from the client node over the second network, the object being contained in the browser cache on the client node;
analyzing the description with respect to a policy associated with a use of a first network to obtain the object contained in the browser cache; and
based at least in part on the analyzing, sending an indication to the client node with respect to a use of the object by a browser operating on the client node when connected to a web-based resource over the second network.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods, and computer readable media are described for validating objects stored in a web cache. In one embodiment, a computing device caches objects received while accessing networked content over a network. The computing device generates a description of conditions associated with the caching of the objects. When the computing device accesses networked content via a second network, the computing device or a remote server connected thereto utilizes the description to determine whether an object in the cache is trusted or untrusted. The server manages a policy that defines rules for making the determination. The policy can be generated based on descriptions received from a plurality of devices.
-
Citations
27 Claims
-
1. A method of managing a browser cache operating on a client node connected to a second network, the method comprising:
-
receiving a description of an object on a server computing node, the description received by the server computing node from the client node over the second network, the object being contained in the browser cache on the client node; analyzing the description with respect to a policy associated with a use of a first network to obtain the object contained in the browser cache; and based at least in part on the analyzing, sending an indication to the client node with respect to a use of the object by a browser operating on the client node when connected to a web-based resource over the second network. - View Dependent Claims (2, 3, 4)
-
-
5. A non-transitory computer-readable storage medium bearing instructions for using objects in a cache that, upon execution by a computing node, at least cause the computing node to:
-
receive information associated with a cached object from a client node, the cached object being used to access content of a network-based resource, the information being indicative of a condition associated with caching the cached object at the client node; analyze the received information with respect to a policy to determine whether the cached object can be used to access the network-based content; and return an indication of the analysis to the client node. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for using a cache on a client node, the system comprising:
a memory having stored thereon instructions that, upon execution, cause the system to at least; receive from the client node a request to analyze an object associated with the cache, the request comprising information associated with the object and indicative of a condition of caching the object at the client node; compare the information to a requirement associated with a use of the object; and provide an indication to the client node regarding the use of the object based at least in part on the comparison. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
Specification