Movatterモバイル変換


[0]ホーム

URL:


US20160359921A1 - Secure local web application data manager - Google Patents

Secure local web application data manager
Download PDF

Info

Publication number
US20160359921A1
US20160359921A1US15/241,658US201615241658AUS2016359921A1US 20160359921 A1US20160359921 A1US 20160359921A1US 201615241658 AUS201615241658 AUS 201615241658AUS 2016359921 A1US2016359921 A1US 2016359921A1
Authority
US
United States
Prior art keywords
data
remotely accessible
accessible web
web data
category
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/241,658
Inventor
Hong C. Li
Mark D. Boucher
Conor P. Cahill
Manohar R. Castelino
Steve Orrin
Vinay Phegade
John E. Simpson, JR.
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel CorpfiledCriticalIntel Corp
Priority to US15/241,658priorityCriticalpatent/US20160359921A1/en
Publication of US20160359921A1publicationCriticalpatent/US20160359921A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Apparatus, systems and methods may provide a browser interface to detect an attempt by web content to manipulate data in a local data store. In addition, the data may be classified into a category if the data is remotely accessible. Additionally, a security policy may be applied to the data based on the category. In one example, a separator may separate the data from other data based on the category, the data may be encrypted/decrypted based on the category, and/or context information and user input may be determined to apply the security policy further based on the context information and the user input.

Description

Claims (20)

We claim:
1. An apparatus comprising:
a browser interface to detect an attempt to access stored data in a local data store by web content received at a browser of the apparatus; and
a separator to:
separate remotely accessible web data from other web data stored in the local data store; and
separate the remotely accessible web data into a plurality of storage regions each associated with a respective category that labels the remotely accessible web data as being a particular type of remotely accessible data.
2. The apparatus ofclaim 1, wherein the remotely accessible web data is to be stored in a storage region associated with a privacy category when the remotely accessible web data is to be labeled as being privacy data, wherein the remotely accessible web data is to be stored in a storage region associated with a cryptographic category when the remotely accessible web data is to be labeled as being cryptographic data, and wherein the remotely accessible web data is to be stored in a storage region associated with an application specific category when the remotely accessible web data is to be labeled as being application specific data.
3. The apparatus ofclaim 1, wherein the remotely accessible web data is to be labeled as being privacy data when the remotely accessible web data is to include remotely accessible browsing history data or personal data, cryptographic data when the remotely accessible web data is to include username information, password information, or challenge information, and application specific data when the remotely accessible web data is to include webmail data, retail data, or auction data.
4. The apparatus ofclaim 1, further including policy logic to apply a security policy to permit access or to deny access to the remotely accessible web data based on the category.
5. The apparatus ofclaim 1, further including a context sensor interface to determine context information for the apparatus, wherein the context information is to include a geolocation of the apparatus when the attempt is made and a use of the apparatus when the attempt is made, and wherein a security policy is to be applied to permit access or to deny access to the remotely accessible web data based on the context information.
6. The apparatus ofclaim 1, wherein the browser interface is to receive user input including a user profile, and wherein a security policy is to be applied to permit access or to deny access to the remotely accessible web data based on the user input.
7. The apparatus ofclaim 1, further including a hardware security element to perform a hardware-assisted encryption process on the remotely accessible web data.
8. The apparatus ofclaim 1, wherein the browser interface is to monitor a Hypertext Markup Language 5 (HTML5) web application to detect the attempt in one or more of an HTML5 Web Storage of the apparatus or an HTML5 Application Cache of the apparatus.
9. A method comprising:
detecting an attempt to access stored data in a local data store by web content received at a browser of an apparatus;
separating remotely accessible web data from other web data stored in the local data store; and
separating the remotely accessible web data into a plurality of storage regions each associated with a respective category that labels the remotely accessible web data as being a particular type of remotely accessible data.
10. The method ofclaim 9, wherein the remotely accessible web data is stored in a storage region associated with a privacy category when the remotely accessible web data is labeled as being privacy data, wherein the remotely accessible web data is stored in a storage region associated with a cryptographic category when the remotely accessible web data is labeled as being cryptographic data, and wherein the remotely accessible web data is stored in a storage region associated with an application specific category when the remotely accessible web data is labeled as being application specific data.
11. The method ofclaim 9, wherein the remotely accessible web data is labeled as being privacy data when the remotely accessible web data includes remotely accessible browsing history data or personal data, cryptographic data when the remotely accessible web data includes username information, password information, or challenge information, and application specific data when the remotely accessible web data includes webmail data, retail data, or auction data.
12. The method ofclaim 9, further including applying a security policy to permit access or to deny access to the remotely accessible web data based on the category.
13. The method ofclaim 9, further including:
determining context information for the apparatus, wherein the context information includes a geolocation of the apparatus when the attempt is made and a use of the apparatus when the attempt is made, and wherein a security policy is applied to permit access or to deny access to the remotely accessible web data based on the context information;
receiving user input including a user profile, wherein the security policy is applied to permit access or to deny access to the remotely accessible web data based on the user input; and
generating a report that identifies the attempt, the remotely accessible web data, the category, and the security policy.
14. The method ofclaim 9, further including performing a hardware-assisted encryption process on the remotely accessible web data.
15. At least one non-transitory computer readable storage medium comprising a set of instructions which, when executed by a processor, cause a device to:
detect an attempt to access stored data in a local data store by web content received at a browser of an apparatus;
separate remotely accessible web data from other web data stored in the local data store; and
separate the remotely accessible web data into a plurality of storage regions each associated with a respective category that labels the remotely accessible web data as being a particular type of remotely accessible data.
16. The at least one computer readable storage medium ofclaim 15, wherein the remotely accessible web data is to be stored in a storage region associated with a privacy category when the remotely accessible web data is to be labeled as being privacy data, wherein the remotely accessible web data is to be stored in a storage region associated with a cryptographic category when the remotely accessible web data is to be labeled as being cryptographic data, and wherein the remotely accessible web data is to be stored in a storage region associated with an application specific category when the remotely accessible web data is to be labeled as being application specific data.
17. The at least one computer readable storage medium ofclaim 15, wherein the remotely accessible web data is to be labeled as being privacy data when the remotely accessible web data is to include remotely accessible browsing history data or personal data, cryptographic data when the remotely accessible web data is to include username information, password information, or challenge information, and application specific data when the remotely accessible web data is to include webmail data, retail data, or auction data.
18. The at least one computer readable storage medium ofclaim 15, wherein the instructions, when executed, cause the device to apply a security policy to permit access or to deny access to the remotely accessible web data based on the category.
19. The at least one computer readable storage medium ofclaim 15, wherein the instructions, when executed, cause the device to:
determine context information for the apparatus, wherein the context information is to include a geolocation of the apparatus when the attempt is made and a use of the apparatus when the attempt is made, and wherein a security policy is to be applied to permit access or to deny access to the remotely accessible web data based on the context information;
receive user input including a user profile, wherein the security policy is to be applied to permit access or to deny access to the remotely accessible web data based on the user input; and
generate a report that is to identify the attempt, the remotely accessible web data, the category, and the security policy.
20. The at least one computer readable storage medium ofclaim 15, wherein the instructions, when executed, cause the device to perform a hardware-assisted encryption process on the remotely accessible web data.
US15/241,6582012-12-202016-08-19Secure local web application data managerAbandonedUS20160359921A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US15/241,658US20160359921A1 (en)2012-12-202016-08-19Secure local web application data manager

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US13/721,912US9436838B2 (en)2012-12-202012-12-20Secure local web application data manager
US15/241,658US20160359921A1 (en)2012-12-202016-08-19Secure local web application data manager

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US13/721,912ContinuationUS9436838B2 (en)2012-12-202012-12-20Secure local web application data manager

Publications (1)

Publication NumberPublication Date
US20160359921A1true US20160359921A1 (en)2016-12-08

Family

ID=50976337

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US13/721,912Expired - Fee RelatedUS9436838B2 (en)2012-12-202012-12-20Secure local web application data manager
US15/241,658AbandonedUS20160359921A1 (en)2012-12-202016-08-19Secure local web application data manager

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US13/721,912Expired - Fee RelatedUS9436838B2 (en)2012-12-202012-12-20Secure local web application data manager

Country Status (5)

CountryLink
US (2)US9436838B2 (en)
EP (1)EP2936376A4 (en)
KR (1)KR101690547B1 (en)
CN (1)CN104838388B (en)
WO (1)WO2014099485A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2019217743A1 (en)*2018-05-112019-11-14Paypal, Inc.System and method for generating privacy data containment and reporting
US10592680B2 (en)*2013-11-082020-03-17Exacttrak LimitedData accessibility control

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10346620B2 (en)*2004-02-062019-07-09Early Warning Service, LLCSystems and methods for authentication of access based on multi-data source information
US9430640B2 (en)2012-09-282016-08-30Intel CorporationCloud-assisted method and service for application security verification
US20140366156A1 (en)*2013-06-092014-12-11Tencent Technology (Shenzhen) Company LimitedMethod and device for protecting privacy information with browser
US9712601B2 (en)*2013-07-222017-07-18International Business Machines CorporationCloud-connectable middleware appliance
KR20150034061A (en)*2013-09-252015-04-02삼성전자주식회사The method and apparatus for setting imaging environment by using signals received from a plurality of clients
US20150278539A1 (en)*2014-03-302015-10-01Lucas G. ScarassoLocation-based data security system
JP6488687B2 (en)*2014-04-102019-03-27富士通株式会社 Function expansion method, function expansion program, and terminal device
US9794289B1 (en)*2014-04-112017-10-17Symantec CorporationApplying security policies based on context of a workload
US9356969B2 (en)2014-09-232016-05-31Intel CorporationTechnologies for multi-factor security analysis and runtime control
US10193737B2 (en)*2014-12-192019-01-29Beijing Qihoo Technology Company LimitedMethod for performing communication between browser and mobile terminal, and browser apparatus
EP3249530A4 (en)*2015-01-222018-01-24Fujitsu LimitedApplication function expansion method, application function expansion program, and application function expansion device
US10860715B2 (en)*2016-05-262020-12-08Barracuda Networks, Inc.Method and apparatus for proactively identifying and mitigating malware attacks via hosted web assets
US10848501B2 (en)*2016-12-302020-11-24Microsoft Technology Licensing, LlcReal time pivoting on data to model governance properties
WO2018191879A1 (en)2017-04-192018-10-25Ebay Inc.Consistency mitigation techniques for real-time streams
US10691485B2 (en)2018-02-132020-06-23Ebay Inc.Availability oriented durability technique for distributed server systems
CN110765444A (en)*2019-09-232020-02-07云深互联(北京)科技有限公司Enterprise browser access permission configuration method and device
CN111143244B (en)*2019-12-302022-11-15海光信息技术股份有限公司 Memory access method of computer device and computer device
US11070982B1 (en)2020-04-152021-07-20T-Mobile Usa, Inc.Self-cleaning function for a network access node of a network
US11824881B2 (en)2020-04-152023-11-21T-Mobile Usa, Inc.On-demand security layer for a 5G wireless network
US11799878B2 (en)2020-04-152023-10-24T-Mobile Usa, Inc.On-demand software-defined security service orchestration for a 5G wireless network
US11444980B2 (en)*2020-04-152022-09-13T-Mobile Usa, Inc.On-demand wireless device centric security for a 5G wireless network
US11057774B1 (en)2020-05-142021-07-06T-Mobile Usa, Inc.Intelligent GNODEB cybersecurity protection system
CN112270012B (en)*2020-11-192022-04-12北京炼石网络技术有限公司Device, method and system for distributed data security protection

Citations (20)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20010013096A1 (en)*1998-06-152001-08-09Gary L. LuckenbaughTrusted services broker for web page fine-grained security labeling
US20020087883A1 (en)*2000-11-062002-07-04Curt WohlgemuthAnti-piracy system for remotely served computer applications
US20030009537A1 (en)*2000-07-212003-01-09Samsung Electronics Co., Ltd.Architecture for home network on world wide web
US20040267783A1 (en)*2003-03-312004-12-30Naoki NaruseInformation processing device and program
US20050149726A1 (en)*2003-10-212005-07-07Amit JoshiSystems and methods for secure client applications
US20050246761A1 (en)*2004-04-302005-11-03Microsoft CorporationSystem and method for local machine zone lockdown with relation to a network browser
US20060041549A1 (en)*2004-08-202006-02-23Gundersen Matthew AMapping web sites based on significance of contact and category
US20060129681A1 (en)*2002-08-192006-06-15Axalto SaSecured method to exchange data between data between browser and a web site
US20060150247A1 (en)*2004-12-302006-07-06Andrew GafkenProtection of stored data
US20070106748A1 (en)*2005-11-012007-05-10Jakobsson Bjorn MMethod and apparatus for storing information in a browser storage area of a client device
US20070256073A1 (en)*2006-03-142007-11-01University Of Utah Research FoundationExtendable framework for distributed applications and data
US20080046997A1 (en)*2006-08-212008-02-21Guardtec Industries, LlcData safe box enforced by a storage device controller on a per-region basis for improved computer security
US20080313648A1 (en)*2007-06-142008-12-18Microsoft CorporationProtection and communication abstractions for web browsers
US20100235830A1 (en)*2009-03-112010-09-16Microsoft CorporationProgramming model for application and data access and synchronization within virtual environments
US20100257578A1 (en)*2009-04-062010-10-07Microsoft CorporationData access programming model for occasionally connected applications
US20110167492A1 (en)*2009-06-302011-07-07Ghosh Anup KVirtual Browsing Environment
US20120017094A1 (en)*2010-07-192012-01-19Google Inc.Managing user accounts
US8161563B2 (en)*2005-06-032012-04-17Microsoft CorporationRunning internet applications with low rights
US20120304286A1 (en)*2011-05-252012-11-29Apple Inc.Methods and apparatus for blocking usage tracking
US20140096241A1 (en)*2012-09-282014-04-03Hong LiCloud-assisted method and service for application security verification

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101398871B (en)*1995-02-132011-05-18英特特拉斯特技术公司Systems and methods for secure transaction management and electronic rights protection
US7092914B1 (en)*1997-11-062006-08-15Intertrust Technologies CorporationMethods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US6366912B1 (en)*1998-04-062002-04-02Microsoft CorporationNetwork security zones
US6567918B1 (en)*1999-01-282003-05-20Microsoft CorporationSaved Web page security system and method
US7092881B1 (en)*1999-07-262006-08-15Lucent Technologies Inc.Parametric speech codec for representing synthetic speech in the presence of background noise
GB2364139B (en)*1999-12-222004-05-26IbmA security mechanism providing access control for locally-held data
US7350204B2 (en)*2000-07-242008-03-25Microsoft CorporationPolicies for secure software execution
ATE305636T1 (en)2002-02-072005-10-15Qualcomm Cambridge Ltd METHOD AND DEVICE FOR PROVIDING CONTENT FOR A MOBILE TERMINAL
US8335915B2 (en)*2002-05-142012-12-18Netapp, Inc.Encryption based security system for network storage
AU2003238908A1 (en)*2002-06-062003-12-22Green Border TechnologiesMethod and system for implementing a secure application execution environment using derived user accounts for internet content
US7571459B2 (en)*2004-04-302009-08-04Microsoft CorporationSystem and method for zone transition mitigation with relation to a network browser
US20060085848A1 (en)*2004-10-192006-04-20Intel CorporationMethod and apparatus for securing communications between a smartcard and a terminal
US8332653B2 (en)*2004-10-222012-12-11Broadcom CorporationSecure processing environment
US7565685B2 (en)*2005-11-122009-07-21Intel CorporationOperating system independent data management
US8009566B2 (en)2006-06-262011-08-30Palo Alto Networks, Inc.Packet classification in a network security device
US8615800B2 (en)2006-07-102013-12-24Websense, Inc.System and method for analyzing web content
US7836497B2 (en)*2006-12-222010-11-16Telefonaktiebolaget L M Ericsson (Publ)Apparatus and method for resilient IP security/internet key exchange security gateway
US8181260B2 (en)*2007-08-152012-05-15International Business Machines CorporationTracking the origins of data and controlling data transmission
BRPI0705090A8 (en)*2007-10-042016-09-13Scopus Solucoes Em Ti Ltda METHOD FOR PROTECTING AGAINST ADULTERATION OF WEB PAGES
US8191117B2 (en)*2007-10-252012-05-29Anchorfree, Inc.Location-targeted online services
US8230060B2 (en)*2008-08-052012-07-24International Business Machines CorporationWeb browser security
US8458765B2 (en)*2009-12-072013-06-04Samsung Electronics Co., Ltd.Browser security standards via access control
US9645992B2 (en)2010-08-212017-05-09Oracle International CorporationMethods and apparatuses for interaction with web applications and web application data
US20120226536A1 (en)*2010-09-282012-09-06Adam KidronEncryption-Free Content Purchase Platform Apparatuses, Methods And Systems
EP2625646B1 (en)2010-10-062022-06-22Citrix Systems Inc.Mediating resource access based on a physical location of a mobile device
US20140173692A1 (en)*2012-12-152014-06-19Sudharshan SrinivasanBring your own device system using a mobile accessory device

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20010013096A1 (en)*1998-06-152001-08-09Gary L. LuckenbaughTrusted services broker for web page fine-grained security labeling
US20030009537A1 (en)*2000-07-212003-01-09Samsung Electronics Co., Ltd.Architecture for home network on world wide web
US20020087883A1 (en)*2000-11-062002-07-04Curt WohlgemuthAnti-piracy system for remotely served computer applications
US20060129681A1 (en)*2002-08-192006-06-15Axalto SaSecured method to exchange data between data between browser and a web site
US20040267783A1 (en)*2003-03-312004-12-30Naoki NaruseInformation processing device and program
US20050149726A1 (en)*2003-10-212005-07-07Amit JoshiSystems and methods for secure client applications
US20050246761A1 (en)*2004-04-302005-11-03Microsoft CorporationSystem and method for local machine zone lockdown with relation to a network browser
US20060041549A1 (en)*2004-08-202006-02-23Gundersen Matthew AMapping web sites based on significance of contact and category
US20060150247A1 (en)*2004-12-302006-07-06Andrew GafkenProtection of stored data
US8161563B2 (en)*2005-06-032012-04-17Microsoft CorporationRunning internet applications with low rights
US20070106748A1 (en)*2005-11-012007-05-10Jakobsson Bjorn MMethod and apparatus for storing information in a browser storage area of a client device
US20070256073A1 (en)*2006-03-142007-11-01University Of Utah Research FoundationExtendable framework for distributed applications and data
US20080046997A1 (en)*2006-08-212008-02-21Guardtec Industries, LlcData safe box enforced by a storage device controller on a per-region basis for improved computer security
US20080313648A1 (en)*2007-06-142008-12-18Microsoft CorporationProtection and communication abstractions for web browsers
US20100235830A1 (en)*2009-03-112010-09-16Microsoft CorporationProgramming model for application and data access and synchronization within virtual environments
US20100257578A1 (en)*2009-04-062010-10-07Microsoft CorporationData access programming model for occasionally connected applications
US20110167492A1 (en)*2009-06-302011-07-07Ghosh Anup KVirtual Browsing Environment
US20120017094A1 (en)*2010-07-192012-01-19Google Inc.Managing user accounts
US20120304286A1 (en)*2011-05-252012-11-29Apple Inc.Methods and apparatus for blocking usage tracking
US8819817B2 (en)*2011-05-252014-08-26Apple Inc.Methods and apparatus for blocking usage tracking
US20140096241A1 (en)*2012-09-282014-04-03Hong LiCloud-assisted method and service for application security verification

Cited By (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10592680B2 (en)*2013-11-082020-03-17Exacttrak LimitedData accessibility control
WO2019217743A1 (en)*2018-05-112019-11-14Paypal, Inc.System and method for generating privacy data containment and reporting
US11062036B2 (en)*2018-05-112021-07-13Paypal, Inc.System and method for generating privacy data containment and reporting
EP3791303A4 (en)*2018-05-112022-01-19PayPal, Inc. PRIVACY DATA RESTRICTION AND REPORTING SYSTEM AND PROCEDURES
US12056247B2 (en)2018-05-112024-08-06Paypal, Inc.System and method for generating privacy data containment and reporting

Also Published As

Publication numberPublication date
EP2936376A4 (en)2016-08-10
CN104838388B (en)2018-11-27
CN104838388A (en)2015-08-12
EP2936376A1 (en)2015-10-28
US9436838B2 (en)2016-09-06
KR101690547B1 (en)2016-12-28
KR20150070382A (en)2015-06-24
US20140181888A1 (en)2014-06-26
WO2014099485A1 (en)2014-06-26

Similar Documents

PublicationPublication DateTitle
US9436838B2 (en)Secure local web application data manager
US12255897B2 (en)Differentiated containerization and execution of web content based on trust level and other attributes
US9245144B2 (en)Secure data container for web applications
US10819507B2 (en)Secure key sharing between a sensor and a computing platform using symmetric key cryptography
US10630711B2 (en)Security data aggregation and business intelligence for web applications
US20130013924A1 (en)Dynamic data-protection policies within a request-reply message queuing environment
US20140094121A1 (en)Integrating wireless input functionality into secure elements
US10528708B2 (en)Prevention of unauthorized resource updates
US8656368B1 (en)System, method, and computer program product for abstract software performance profiling
US20250132913A1 (en)Securing data sent between computing devices
KR102742034B1 (en)Electronic apparatus using homomorphic cipher and method thereof

Legal Events

DateCodeTitleDescription
STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:ADVISORY ACTION MAILED

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp