LOCKBOX FOR MITIGATING SAME ORIGIN POLICY FAILURES
First Claim
1. A system allowing mitigating security policy failures in a computing environment comprising:
- a lockbox module operative to process one or more requests for data and/or an application feature; and
an instruction set comprising at least one instruction instructing the lockbox module to generate a lockbox computing application element operative to associate security privileges to selected content and to process data and/or an application feature to determine the data and/or application feature is associated with the lockbox computing application element according to a selected SOP management paradigm,wherein the SOP management paradigm comprises at least one instruction to associate data and/or an application feature with a lockbox comprising one or more lockbox operational properties.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods to manage same-origin-policy (SOP) failures that occur in a computing environment are provided. In an illustrative implementation, an exemplary computing environment comprises a lockbox module, and an instruction set comprising at least one instruction directing the lockbox module to process data and/or computing application execution commands representative of and a request for a selected operation/feature according to a selected SOP management paradigm. In the illustrative implementation, the SOP management paradigm comprises one or more instructions to deploy a “lockbox” computing application element allowing for the management, monitoring, and control of computing application features/operations operable under a same origin policy.
43 Citations
20 Claims
-
1. A system allowing mitigating security policy failures in a computing environment comprising:
-
a lockbox module operative to process one or more requests for data and/or an application feature; and an instruction set comprising at least one instruction instructing the lockbox module to generate a lockbox computing application element operative to associate security privileges to selected content and to process data and/or an application feature to determine the data and/or application feature is associated with the lockbox computing application element according to a selected SOP management paradigm, wherein the SOP management paradigm comprises at least one instruction to associate data and/or an application feature with a lockbox comprising one or more lockbox operational properties. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method to mitigate SOP failures in a computing environment comprising:
-
creating a lockbox computing application element operative to associate security privileges to selected content; receiving a request for data and/or application feature that is contained in the lockbox computing application element; identifying the source of the received request to determine if the source is a selected approved source to which the lockbox computing application element is operable to provide access; and providing the requested data and/or application feature to the source of the received request if the sources is a selected approved source. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer-readable medium having computer executable instructions to instruct a computing environment to perform a method comprising:
-
creating a lockbox computing application element operative to associate security privileges to selected content; receiving a request for data and/or application feature that is contained in the lockbox computing application element; identifying the source of the received request to determine if the source is a selected approved source to which the lockbox computing application element is operable to provide access; and providing the requested data and/or application feature to the source of the received request if the sources is a selected approved source.
-
Specification