Information security – Policy
Reexamination Certificate
2011-01-11
2011-01-11
Moore, Ian N (Department: 2491)
Information security
Policy
C726S002000, C726S003000, C726S022000, C726S027000, C713S152000, C709S217000, C709S229000
Reexamination Certificate
active
07870596
ABSTRACT:
The present invention extends to methods, systems, and computer program products for accessing network resources outside a security boundary. The present invention can provide a modules running within a security boundary (e.g., sandboxed client-side scripts) access to network resources at computer systems other than the computer system where the module originated. When network access is permitted, the properties of network request can be adjusted so that security information of the client system and the originating computer system for the module are not divulged. Thus, a module can obtain content for inclusion in a Web page from third party servers in a more secure meaner. Network e access decisions can be made based on ambient data already accessible to a host environment such that network access decisions can be made in a more automated manner.
REFERENCES:
patent: 6192476 (2001-02-01), Gong
patent: 6199181 (2001-03-01), Rechef
patent: 6272641 (2001-08-01), Ji
patent: 6691230 (2004-02-01), Bardon
patent: 6832239 (2004-12-01), Kraft et al.
patent: 7444678 (2008-10-01), Whitmer et al.
patent: 7669227 (2010-02-01), Malcolm
patent: 2004/0006706 (2004-01-01), Erlingsson
patent: 2007/0169168 (2007-07-01), Lim
patent: 2008/0189767 (2008-08-01), Kothari et al.
U.S. Appl. No. 11/670,142, mail date Oct. 30, 2009, Office Action.
U.S. Appl. No. 11/670,142, mail date May 13, 2010, Office Action.
Related U.S. Appl. No. 11/670,142, filed Feb. 1, 2007 (Not Yet Published).
“White Paper, Adobe AIR Security”, Adobe AIR beta 3 release draft, Dec. 14, 2007, Adobe Systems Incorporated.
Gong, Li, “Java 2 Platform Security Architecture”, Version 1.2, Copyright 1997-2002 Sun Microsystems Inc., http://java.sun.com/j2se/1.4.2/docs/guide/security/spec/security-spec.doc.html—Downloaded Jul. 30, 2008.
Gary McGraw and Edward Felten, “Understanding the Keys to Java Security—The Sandbox and Authentication” JavaWorld.com, May 1, 1997, http://www.javaworld.com/cgi-bin/mailto/x—java.cgi—Downloaded Jul. 30, 2008.
Kothari Nikhil
Schackow Stefan N.
Microsoft Corporation
Moore Ian N
Potratz Daniel
Workman Nydegger
LandOfFree
Accessing network resources outside a security boundary does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Accessing network resources outside a security boundary, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Accessing network resources outside a security boundary will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2656603