Secure browsing via a transparent network proxy
First Claim
1. A system, comprising:
- a non-transitory memory that stores instructions;
a computer processor that executes the instructions to perform operations, the operations comprising;
receiving, from a browser on a device, a request to access a resource;
determining that the resource is not trusted based on an analysis of an identifier included with the request, wherein the resource is determined to not be trusted based on determining that the identifier has not been previously used;
redirecting the browser on the client device to a browser virtual machine via a desktop virtualization technology connection;
removing a virtual browser control bar from the browser virtual machine;
filtering, by utilizing the browser virtual machine, malicious content from the resource;
rendering strictly a viewable window of the browser virtual machine, wherein the viewable window includes a rendering of the resource; and
streaming, after filtering the malicious content from the resource, the rendering of the viewable window of the browser virtual machine rendering the resource from the browser virtual machine to a viewable window of the browser on the client device based on the request, wherein controls in a control bar of the browser are utilized to control the browser virtual machine displayed within the viewable window of the browser.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for providing secure browsing via a transparent network proxy is disclosed. The system may receive, from a client, a request to access a resource. The request may include an identifier that may be utilized to locate the resource. Once the request is received, the system may determine if the resource is not trusted, such as if the identifier is determined to be unknown or suspicious. If the resource is determined to not be trusted by the system, the system may forward the request to a virtual machine manager that may select a browser virtual machine from a pool of browser virtual machines. After the browser virtual machine is selected, the browser virtual machine may stream a rendering of the resource to the client based on the request. The rendering of the resource may be provided in lieu of the actual resource.
-
Citations
20 Claims
-
1. A system, comprising:
-
a non-transitory memory that stores instructions; a computer processor that executes the instructions to perform operations, the operations comprising; receiving, from a browser on a device, a request to access a resource; determining that the resource is not trusted based on an analysis of an identifier included with the request, wherein the resource is determined to not be trusted based on determining that the identifier has not been previously used; redirecting the browser on the client device to a browser virtual machine via a desktop virtualization technology connection; removing a virtual browser control bar from the browser virtual machine; filtering, by utilizing the browser virtual machine, malicious content from the resource; rendering strictly a viewable window of the browser virtual machine, wherein the viewable window includes a rendering of the resource; and streaming, after filtering the malicious content from the resource, the rendering of the viewable window of the browser virtual machine rendering the resource from the browser virtual machine to a viewable window of the browser on the client device based on the request, wherein controls in a control bar of the browser are utilized to control the browser virtual machine displayed within the viewable window of the browser. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method, comprising:
-
receiving, from a browser on a device, a request to access a resource; determining, by utilizing instructions from a memory that are executed by a processor, that the resource is not trusted based on an analysis of an identifier included with the request, wherein the resource is determined to not be trusted based on determining that the identifier has not been previously used; redirecting the browser on the client device to a browser virtual machine via a desktop virtualization technology connection; removing a virtual browser control bar from the browser virtual machine; removing, by utilizing the browser virtual machine, malicious content from the resource; rendering strictly a viewable window of the browser virtual machine, wherein the viewable window includes a rendering of the resource; and streaming, after filtering the malicious content from the resource, the rendering of the viewable window of the browser virtual machine rendering the resource from the browser virtual machine to a viewable window of the browser on the client device based on the request, wherein controls in a control bar of the browser are utilized to control the browser virtual machine displayed within the viewable window of the browser. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable device comprising instructions, which when loaded and executed by a processor, cause the processor to perform operations, the operations comprising:
-
receiving, from a browser on a device, a request to access a resource; determining, by utilizing instructions from a memory that are executed by a processor, that the resource is not trusted based on an analysis of an identifier included with the request, wherein the resource is determined to not be trusted based on determining that the identifier has not been previously used; redirecting the browser on the client device to a browser virtual machine via a desktop virtualization technology connection; removing a virtual browser control bar from the browser virtual machine; filtering, by utilizing the browser virtual machine, malicious content from the resource; rendering strictly a viewable window of the browser virtual machine, wherein the viewable window includes a rendering of the resource; and providing, after filtering the malicious content from the resource, the rendering of the viewable window of the browser virtual machine rendering the resource from the browser virtual machine to a viewable window of the browser on the client device based on the request, wherein controls in a control bar of the browser are utilized to control the browser virtual machine displayed within the viewable window of the browser.
-
Specification