Accessing network resources outside a security boundary

Information security – Policy

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S002000, C726S003000, C726S022000, C726S027000, C713S152000, C709S217000, C709S229000

Reexamination Certificate

active

07870596

ABSTRACT:
The present invention extends to methods, systems, and computer program products for accessing network resources outside a security boundary. The present invention can provide a modules running within a security boundary (e.g., sandboxed client-side scripts) access to network resources at computer systems other than the computer system where the module originated. When network access is permitted, the properties of network request can be adjusted so that security information of the client system and the originating computer system for the module are not divulged. Thus, a module can obtain content for inclusion in a Web page from third party servers in a more secure meaner. Network e access decisions can be made based on ambient data already accessible to a host environment such that network access decisions can be made in a more automated manner.

REFERENCES:
patent: 6192476 (2001-02-01), Gong
patent: 6199181 (2001-03-01), Rechef
patent: 6272641 (2001-08-01), Ji
patent: 6691230 (2004-02-01), Bardon
patent: 6832239 (2004-12-01), Kraft et al.
patent: 7444678 (2008-10-01), Whitmer et al.
patent: 7669227 (2010-02-01), Malcolm
patent: 2004/0006706 (2004-01-01), Erlingsson
patent: 2007/0169168 (2007-07-01), Lim
patent: 2008/0189767 (2008-08-01), Kothari et al.
U.S. Appl. No. 11/670,142, mail date Oct. 30, 2009, Office Action.
U.S. Appl. No. 11/670,142, mail date May 13, 2010, Office Action.
Related U.S. Appl. No. 11/670,142, filed Feb. 1, 2007 (Not Yet Published).
“White Paper, Adobe AIR Security”, Adobe AIR beta 3 release draft, Dec. 14, 2007, Adobe Systems Incorporated.
Gong, Li, “Java 2 Platform Security Architecture”, Version 1.2, Copyright 1997-2002 Sun Microsystems Inc., http://java.sun.com/j2se/1.4.2/docs/guide/security/spec/security-spec.doc.html—Downloaded Jul. 30, 2008.
Gary McGraw and Edward Felten, “Understanding the Keys to Java Security—The Sandbox and Authentication” JavaWorld.com, May 1, 1997, http://www.javaworld.com/cgi-bin/mailto/x—java.cgi—Downloaded Jul. 30, 2008.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Accessing network resources outside a security boundary does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Accessing network resources outside a security boundary, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Accessing network resources outside a security boundary will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2656603

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.