Remote DOM access

a remote dom and access technology, applied in the field of internet security, can solve the problems of network firewalls being useless against malicious plug-ins, visible and invisible plug-ins, and affecting the security of the network,

Active Publication Date: 2014-08-19
IBM CORP
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0018]In one embodiment the invention comprises an embedded proxy emulating said browser, and an embedded proxy emulating a process, thereby to protect said browser from malicious processes.

Problems solved by technology

However, some plug-ins, visible and invisible, can be malicious and can, for example, spy on the users (e.g. obtain unauthorized access to personal information and transmit it to a third party).
It is a severe drawback of network / personal firewalls, that they are useless when the user installs a malicious plugin.
Likewise, once the PC is infected, a network firewall is useless against malicious plug-ins, because they generate traffic that is indistinguishable from that of the browser.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026]FIG. 1 is a simplified representation of a communication 100 between a client 101 (a browser) and a server 105 (i.e. a website). Client 101 sends a request 103 to server 105. Replying to the request 103 server 105 sends an answer 107, which can be a requested file (such as an HTML one), an acknowledgement, an error message, or other information.

[0027]FIG. 2 is an example of a simplified representation of one example of a communication 200 between a browser 101 and a server 105 involving plug-in 202, which can be, for example, malicious software. Client 101 sends a request 204 to server 105. This request 204 is intercepted by plug-in 202, which can transmit, destroy or change said request 204. A new request 206 is received by server 105. Answer 208 from server 105 to browser 101 is intercepted by malicious software 202 which can transmit, destroy or change said response 208. If changed, a new response 210 is transmitted to client 101.

[0028]Plug-ins can perform a great variety o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for protecting a browser from malicious processes, comprises providing at least one process-proxy object and at least a browser-proxy object, interposed between the browser and a process, such that when the process invokes one of the DOM entry points, the process-proxy object isolates it from the real browser implementation and executes the process-proxy object's code instead.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application is a Continuation-In-Part of U.S. Ser. No. 12 / 189,444, filed 11 Aug. 2008, which claims benefit of U.S. Ser. No. 61 / 056,048, filed 26 May 2008 and which applications are incorporated herein by reference. To the extent appropriate, a claim of priority is made to each of the above disclosed applications.FIELD OF THE INVENTION[0002]The present invention relates to internet security and more particularly to a system allowing filtering data using a browser process firewall.BACKGROUND OF THE INVENTION[0003]A browser is a software application enabling a user to display and interact with information (text, images, audios and videos records and streams, forms, etc.) located on a page (also called, webpage) at a website on a network (such as the World Wide Web or an intranet). Any information on a webpage has an associated attribute allowing the linking of this information to other information at another location of a network.[0004...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(United States)
IPC IPC(8): G06F21/00H04L29/06G06F21/55G06F21/52
CPCG06F21/55H04L63/168H04L63/1441G06F2221/2119H04L63/0263G06F21/52H04L63/0281
Inventor KLEIN, AMITBEN-HAIM, ELDANIZMERLY, OLEGREGEV, SHMUELBOODAEI, MICHAEL
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products