SANDBOX WEB NAVIGATION
First Claim
1. A method comprising:
- detecting selection of a hyperlink in a host session of a host system;
determining that a web page referenced by the hyperlink should be opened in a sandbox session, wherein the sandbox session virtualizes at least some resources of the host system;
creating the sandbox session;
opening a web browser in the sandbox session; and
loading the web page referenced by the hyperlink in the web browser in the sandbox session.
1 Assignment
0 Petitions
Accused Products
Abstract
Browsing the World Wide Web may expose a user'"'"'s system to malicious attacks that can lead to data loss and/or system failure. Sometimes a user desires to access information on a web page that may contain malicious content. For example, a college student researching computer hacking may need information provided on a hacking website even though the site is potentially dangerous. Although techniques are employed to install potentially harmful executable files into a sandbox (e.g., virtual machine), these techniques do not address navigation of harmful sites. Functionality can be implemented to instantiate a web browser within a controlled virtual environment (“sandbox”) that simulates the host system while restricting the virtual environment to designated space(s) and/or resources of the host system to prevent harmful effects. Instantiating the web browser in the sandbox allows web navigation of risky web sites without deleterious effects on the host system.
120 Citations
23 Claims
-
1. A method comprising:
-
detecting selection of a hyperlink in a host session of a host system; determining that a web page referenced by the hyperlink should be opened in a sandbox session, wherein the sandbox session virtualizes at least some resources of the host system; creating the sandbox session; opening a web browser in the sandbox session; and loading the web page referenced by the hyperlink in the web browser in the sandbox session. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
determining that a web page referenced by a hyperlink should be opened in a sandbox session, wherein the sandbox session virtualizes resources of a host system; loading the web page in a web browser in the sandbox session; detecting a request to save an artifact of the web page; determining that the artifact is free of malicious content; and saving the artifact to persist beyond termination of the sandbox session. - View Dependent Claims (10, 11, 12, 13)
-
-
14. One or more machine-readable media having stored therein a program product, which when executed by a set of one or more processor units causes the set of one or more processor units to perform operations that comprise:
-
detecting selection of a hyperlink in a host session of a host system; determining that a web page referenced by the hyperlink should be opened in a sandbox session, wherein the sandbox session virtualizes at least some resources of the host system; creating the sandbox session; opening a web browser in the sandbox session; and loading the web page referenced by the hyperlink in the web browser in the sandbox session. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. An apparatus comprising:
-
a set of one or more processing units; a network interface; and a sandbox session management unit operable to, detect selection of a hyperlink in a host session of a host system; determine that a web page referenced by the hyperlink should be opened in a sandbox session, wherein the sandbox session virtualizes at least some resources of the host system; create the sandbox session; open a web browser in the sandbox session; and load the web page referenced by the hyperlink in the web browser in the sandbox session. - View Dependent Claims (23)
-
Specification