Method and apparatus for secure web browsing

A network attack, web page technology, applied in the field of communication network, can solve the problems of outdated software, malicious use, difficult combination, etc.

Inactive Publication Date: 2009-02-18
LUCENT TECH INC
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] On the downside, software that attempts to prevent the execution of web browser attacks tends to quickly become outdated as new viruses, malware, spyware, and other attacks are constantly being developed
Similarly, although a proxy server can act as a filter for web pages sent from a web server to a user device, a proxy server still poses a significant risk by ultimately sending the web page from the web server to the user device
Furthermore, for individual small companies and often even medium-sized companies, it is difficult to deploy a combination of existing solutions that provides the best possible protection
In addition, even for large companies with the ability to implement various combinations of existing solutions, the combination of current solutions still has weaknesses that can often be exploited maliciously

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for secure web browsing
  • Method and apparatus for secure web browsing
  • Method and apparatus for secure web browsing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention provides safer Internet browsing by transferring the risk of safe use from the user equipment to the proxy server. The present invention prevents the infected webpage from running locally on the user equipment that may contain sensitive information; while on the proxy server, the image-based webpage presentation (herein referred to as webpage snapshot) is generated from the webpage and provided to the user equipment for presentation to the user . In other words, the present invention enables users to remotely process / run web pages in the proxy server to prevent malicious code from running on the user's device (instead, restrict the malicious code to the proxy server).

[0020] Figure 1 is a high-level block diagram illustrating a communication network. Specifically, the communication network 100 includes a web server (WS) 110, a proxy server (PS) 120, and a user equipment (UD) 130. The WS 110 and the PS 120 communicate using a communication path (CP) 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention includes a method and an apparatus for protecting a user device from web attacks using a proxy server. In one embodiment, a method includes receiving a web page comprising web page content and code, generating an image-based representation of the web page that includes the web page content and excludes the code, and propagating the image-based representation of the web page toward the user device. In one embodiment, a method includes receiving an interaction with an image-based representation of a web page, generating a web page interaction from the interaction with the image-based representation of the web page, implementing the web page interaction, generating an instruction using the implemented web page interaction, and propagating the instruction toward a web server.

Description

Technical field [0001] The present invention relates to the field of communication networks, and more specifically, to secure web browsing. Background technique [0002] The Internet allows users to browse websites that contain web pages, or web pages that contain various types of information. The user uses the web browser associated with the user device to browse the web page, it requests, receives the web page and provides the web page to the user. However, many websites and associated web pages contain malicious codes such as viruses, malware, spyware, and other malicious codes, which are downloaded to and run by the user's device, thereby infecting the user's device. Specifically, new trends in viruses, malware, and spyware include using infected software codes (such as Java, ActiveX, etc.) to launch attacks on user devices. Attacks may include crashing user equipment, stealing information stored on user equipment, collecting information on Internet usage trends, and implemen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/56
CPCH04L63/1441G06F2221/2119H04L29/08702G06F2221/2115H04L67/28H04L63/0281H04L29/08756H04L67/02H04L29/0809G06F21/566H04L67/2823H04L67/565H04L67/56
Inventor D·拉米雷斯
Owner LUCENT TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products