Data driven system for responding to security vulnerability
First Claim
1. A system that responds to a security vulnerability associated with a computer-executable viewing application, the system comprising:
- one or more processor devices; and
one or more memory devices that store instructions, which when executed by the one or more processor devices, perform actions that include;
employing a request detector to detect a request related to a first content element and a second content element that are included in a data source of the viewing application, wherein the security vulnerability is further associated with the first content element;
employing a content parser to determine a characteristic of the first content element and a characteristic of the second content element;
employing a security data file parser to interrogate a security data file with the characteristic of the first content element and the characteristic of the second content element; and
employing at least a decision module to disallow operations relating to the first content element and to allow operations relating to the second content element based on a result of the interrogating of the security data file, wherein the security data file includes an entry corresponding to the characteristic of the first content element and does not include an entry corresponding to the characteristic of the second content element.
2 Assignments
0 Petitions
Accused Products
Abstract
A data-driven system for fast response to security vulnerability, in one example embodiment, comprises a request detector, a content type evaluator, and a presentation module. A request detector may be configured to detect a request to display content. A content type evaluator may be configured to determine a type of the requested content. A presentation module may be configured to selectively display the requested content based on the determined type of the requested content. The content type evaluator and the presentation module may utilize a data file that stores information related to potential vulnerabilities associated with a content viewing application. Example data file may be an XML file.
-
Citations
20 Claims
-
1. A system that responds to a security vulnerability associated with a computer-executable viewing application, the system comprising:
-
one or more processor devices; and one or more memory devices that store instructions, which when executed by the one or more processor devices, perform actions that include; employing a request detector to detect a request related to a first content element and a second content element that are included in a data source of the viewing application, wherein the security vulnerability is further associated with the first content element; employing a content parser to determine a characteristic of the first content element and a characteristic of the second content element; employing a security data file parser to interrogate a security data file with the characteristic of the first content element and the characteristic of the second content element; and employing at least a decision module to disallow operations relating to the first content element and to allow operations relating to the second content element based on a result of the interrogating of the security data file, wherein the security data file includes an entry corresponding to the characteristic of the first content element and does not include an entry corresponding to the characteristic of the second content element. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for responding to a security vulnerability associated with a computer-executable viewing application, the method comprising:
-
detecting, via more processor devices, a request to invoke functionality of the viewing application that is associated with a control element of the viewing application and the security vulnerability; determining, via the one or more processor devices, a characteristic of the control element of the viewing application; interrogating a security data file via the one or more processor devices and the determined characteristic; and determining, via the one or more processor devices, to disable the functionality associated with the control element when the interrogating locates an entry included in the security data file that indicates disabling the functionality. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification