$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Protection and communication abstractions for web browsers 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-012/859
  • G06F-021/53
  • G06F-009/455
  • H04L-029/06
출원번호 US-0762900 (2007-06-14)
등록번호 US-10019570 (2018-07-10)
발명자 / 주소
  • Wang, Jiahe Helen
  • Fan, Xiaofeng
  • Jackson, Collin Edward
  • Howell, Jonathan Ryan
  • Xu, Zhenbin
출원인 / 주소
  • Microsoft Technology Licensing, LLC
대리인 / 주소
    Singh Law, PLLC
인용정보 피인용 횟수 : 0  인용 특허 : 143

초록

Systems and methodologies for accessing resources associated with a Web-based application in accordance with one or more embodiments disclosed herein may include a browser that obtains at least first resources from a first domain and second resources from a second domain and a resource management co

대표청구항

1. A system comprising at least one processor coupled to a non-transitory computer-readable storage medium storing instructions executable by the at least one processor to implement: a browser configured to integrate first content from a first server associated with a first domain with second conten

이 특허에 인용된 특허 (143)

  1. Cornelius, Richard D.; Stepniczka, Andreas; Chu, Kevin, Account settlement and financing in an e-commerce environment.
  2. Ansell, Steven T.; Cherenson, Andrew R.; Rishniw, Leon; Cannon, Susan A.; Allard, Edward J.; Brownell, Jason S.; Stroud, Micah, Adaptable security mechanism for preventing unauthorized access of digital data.
  3. Jerger Michael S. ; Bisset Jeffrey A. ; Sinclair Craig T. ; Toutonghi Michael J., Administering permissions associated with a security zone in a computer system security model.
  4. Win Teresa ; Belmonte Emilio, Administrative roles that govern access to administrative functions.
  5. Hoshino, Masaaki; Tsunoda, Tomohiro, Advertisement insert apparatus and advertisement insert method, and storage medium.
  6. Hind John Raithel ; Lindquist David Bruce ; Nanavati Pratik Biharilal ; Tan Yih-Shin ; Wesley Ajamu Akinwunmi, Applet redirection for controlled access to non-orginating hosts.
  7. Shrader, Theodore Jack London; Rich, Bruce Arland; Yarsa, Julianne; Skibbie, Donna, Architecture for dynamic permissions in java.
  8. McCollum Tab ; Jury Thomas W., Assigning security levels to particular documents on a document by document basis in a database.
  9. Hinton,Heather Maria; Vandenwauver,Mark, Authentication and authorization protocol for secure web-based access to a protected resource.
  10. Frezza William A. (Warminster PA) Conover Richard D. (Richboro PA) Kaufman David (Torrance CA), Bootstrap channel security arrangement for communication network.
  11. Nigel Edwards GB; Owen Rees GB; Qun Zhong, Browser system.
  12. Underwood, Roy Aaron, Business components framework.
  13. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Duigou, Michael J., Client-specified display services in a distributed computing environment.
  14. Atkinson Robert G. ; Price Robert M. ; Contorer Aaron M., Code certification for network transmission.
  15. Hailpern Brent Tzion ; Malkin Peter Kenneth ; Schloss Robert Jeffrey ; White Steve R. ; Yu Philip Shi-Lung ; Palmer Charles Campbell, Collaborative server processing of content and meta-information with application to virus checking in a server network.
  16. Seki Toshibumi (Yokohama JPX), Communication system capable of detecting missed messages.
  17. Stammers,Soren; Band,Jamie A.; Sadler,Andrew P.; Patterson,Andrew J., Component installer permitting interaction among isolated components in accordance with defined rules.
  18. Ji Shuang, Computer network malicious code scanner.
  19. Ji Shuang, Computer network malicious code scanner method and apparatus.
  20. Joshi Bhagirath S. (11 Sheffield Rd. Waltham MA 02154), Computer software security system.
  21. Hiraga,Masaki, Contents filtering method, contents filtering apparatus and contents filtering program.
  22. Ramachandran,Viyyokaran Raman; Sitaram,Dinkar; Doshi,Kshitij Arun, Cross domain authentication and security services using proxies for HTTP access.
  23. Karger Paul A. (Acton MA), Cross-domain call system in a capability based digital data processing system.
  24. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Hollis Lloyd L. (Cary NC) Lennon Richard E. (Woodstock NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Oseas J, Cryptographic communication security for multiple domain networks.
  25. Kennelly, Richard J.; Donahue, Peter E.; Farrell, Bernard; Cole, Robert E., Custom administrator views of management objects.
  26. Thomas A. Nolting ; Richard LaPearl ; Karen Dion, Data preparation for traffic track usage measurement.
  27. Redlich,Ron M.; Nemzow,Martin A., Data security system and method adjunct to e-mail, browser or telecom program.
  28. Valente, Luis Filipe Pereira; Cooper, Geoffrey Howard; Shaw, Robert Allen; Sherlock, Kieran Gerard, Declarative language for specifying a security policy.
  29. Michael S. Jerger ; Jeffrey A. Bisset ; Craig T. Sinclair ; Michael J. Toutonghi, Declarative permission requests in a computer system.
  30. Michael S. Jerger ; Jeffrey A. Bisset ; Craig T. Sinclair ; Michael J. Toutonghi, Directional set operations for permission based security in a computer system.
  31. Scanlan Thomas K., Dynamic assignment of security parameters to web pages.
  32. Erickson, Thomas D.; Kellogg, Wendy A.; Malkin, Peter K.; Richards, John T.; Yu, Philip S., Dynamic behavior-based access control system and method.
  33. LaMacchia,Brian A; Kohnfelder,Loren M.; Fee,Gregory Darrell; Toutonghi,Michael J., Evidence-based security policy manager.
  34. David Hitz ; Andrea Borr ; Robert J. Hawley ; Mark Muhlestein ; Joan Pearson, File access control in a multi-protocol file server.
  35. Obayashi, Masayuki; Nobori, Masahiro; Oyama, Masami, Information processing apparatus including storage.
  36. Bloch, Joshua J., Inheritable thread-local storage.
  37. Van Doorn, Leendert Peter, Integrating operating systems and run-time systems.
  38. Hoffberg, Steven M., Intelligent electronic appliance system and method.
  39. Wood, David L.; Weschler, Paul; Norton, Derk; Ferris, Chris; Wilson, Yvonne; Soley, William R., Log-on service providing credential level change without loss of session continuity.
  40. Moreh, Jahanshah; Olkin, Terry Michael; Bruns, Logan O'Sullivan; Perrin, Trevor Scott, METHOD AND SYSTEM OF FEDERATED AUTHENTICATION SERVICE FOR INTERACTING BETWEEN AGENT AND CLIENT AND COMMUNICATING WITH OTHER COMPONENTS OF THE SYSTEM TO CHOOSE AN APPROPRIATE MECHANISM FOR THE SUBJECT.
  41. Barnes, Brian C.; Strongin, Geoffrey S.; Schmidt, Rodney W., Memory management system and method for providing physical address based memory access security.
  42. Strongin, Geoffrey S.; Barnes, Brian C.; Schmidt, Rodney W., Memory management system and method providing increased memory access security.
  43. Boutros,Sami; Truong,Steve H., Method and apparatus for adding and updating protocol inspection knowledge to firewall processing during runtime.
  44. Angelo Michael F., Method and apparatus for allowing access to secured computer resources by utilzing a password and an external encryptio.
  45. Hayden Peter C. (Mont Vernon NH), Method and apparatus for detecting and executing cross-domain calls in a computer system.
  46. Swanson Jim A. (Dallas/Fort Worth Airport TX), Method and apparatus for developing scripts that access mainframe resources that can be executed on various computer sys.
  47. Cohen, William W., Method and apparatus for extracting data from data sources on a network.
  48. Hookway Raymond J. ; Yates John S. ; Tye Steven Tony, Method and apparatus for forming a translation unit.
  49. Porter Mark A. (Woodside CA) Pawson Dave (Palo Alto CA), Method and apparatus for frame accurate access of digital audio-visual information.
  50. Magee James Michael ; Rawson ; III Freeman Leigh ; Sotomayor ; Jr. Guy Gil, Method and apparatus for management of mapped and unmapped regions of memory in a microkernel data processing system.
  51. Wong,Alexander Y., Method and apparatus for network content distribution using a personal server approach.
  52. Russell William C. (Laguna Hills CA) Kalwitz George A. (Costa Mesa CA) Barrett Lorraine F. (Yorba Linda CA), Method and apparatus for remotely altering programmable firmware stored in an interactive network board coupled to a net.
  53. Christie, David S.; Schmidt, Rodney; Strongin, Geoffrey S., Method and apparatus for storing and retrieving security attributes.
  54. Cooper, Phillip R.; Kohnfelder, Loren M.; Chavez, Roderick A., Method and apparatus for writing a windows application in HTML.
  55. Oliver,Jonathan J.; Koblas,David A.; Wilson,Brian K., Method and system for classifying a message based on canonical equivalent of acceptable items included in the message.
  56. Gardner,Jules E.; Gelles,Keith J.; Sloyer,Brian P., Method and system for creating and displaying images including pop-up images on a visual display.
  57. Kalantar, Michael Husayn; Merwah, Rahul Kumar; Tracey, John Michael, Method and system for cross-domain service invocation using a single data handle associated with the stored common data and invocation-specific data.
  58. Bardon, Didier D., Method and system for extending Java applets sand box with public client storage.
  59. Guthrie John, Method and system for inserting code to conditionally incorporate a user interface component in an HTML document.
  60. Hanson, Michael; Miller, Graham; Axe, Brian; Evans, Steven Richard, Method and system for process interaction among a group.
  61. Lincke Scott D. ; Marianetti ; II Ronald, Method and system for secure communications.
  62. Trevor Blumenau, Method and system for the discovery of cookies and other client information.
  63. Austin Todd Michael (Madison WI), Method for detecting computer memory access errors.
  64. Trifon,Gal, Method for dynamically changing one Web page by another web page.
  65. Eilbott, Seth Aaron; Rodriguez, Jeffrey Edward; Walker, Michael John, Method for prefetching external resources to embedded objects in a markup language data stream.
  66. Laor Raviv, Method of and system for distributing and redeeming electronic coupons.
  67. Wolfe Everett W. (Lauderdale Lakes FL), Method of controlling the copying of software.
  68. Kelley, Edward E., Method of controlling web applications from redirecting a client to another web address.
  69. Lajoie,Marie Eve; St Arnaud,Fran챌ois; Baril,Steve; Boivin,Jacques, Method of remotely upgrading firmware in field-deployed devices.
  70. Fletcher,James Corvin; Kaminsky,David Louis; Kessler,Carl Shawn, Method, system and apparatus for selecting encryption levels based on policy profiling.
  71. Buchthal,David Michael; Forschler,Lucas Jason; Gallagher,Thomas Patrick; Loisey,Christophe Rene; Pullen,Walter David; Turski,Andrzej, Method, system, and computer-readable medium for filtering harmful HTML in an electronic document.
  72. Lewallen, Stephen Richard, Method, system, and program for generating a graphical user interface window for an application program.
  73. Howard, Michael; Brown, Don L.; Clark, Quentin J.; Dillingham, Lara N.; Meijer, Ronald; Multerer, Boyd C.; Sellers, Timothy D., Methods and apparatus for synchronizing access control in a web server.
  74. Howard,Michael; Malhotra,Vikas, Methods and systems for screening input strings intended for use by web servers.
  75. Marolia,Sunil; Chia,Teck; Dinh,John D. V.; Soberano,Vincent P.; Hamasaki, Jr.,Glenn; Gustafson,James P.; Pakarinen,Toni; Jacobi,Sidney A., Mobile services network for update of firmware/software in mobile handsets.
  76. Rose, Anthony, Monitoring of computer-related resources and associated methods and systems for disbursing compensation.
  77. Lawrence Sampson ; Emilio Belmonte ES; Marco Fanti ; Raul Medina, Multi-domain access control.
  78. Michael J. Wallent ; Rajeev Dujari ; Anand Ramakrishna ; Loren M. Kohnfelder ; Lewis Geer, Network security zones.
  79. Nguyen Minhtam C. (10018 Lexington Estates Blvd. Boca Raton FL 33428), Network with secure communications sessions.
  80. Lewis Robert W. ; Tanner Matthew A. ; Walker Timothy K., Object-oriented computer program, system, and method for developing control schemes for facilities.
  81. Faden,Glenn, Policy abstraction mechanism.
  82. Karmouch,Ahmed; Gray,Tom; Mankovskii,Serge; Guennoun,Mouheine, Policy representations and mechanisms for the control of software.
  83. Cohen Geoffrey Alexander ; Kaminsky David Louis ; King Richard Adam ; MacKinnon Matthew Raymond, Process for running applets over non-IP networks.
  84. Spiegel, Christopher J.; Gafken, Andrew H.; Hale, Robert P.; Stevens, Jr., William A., Protected boot flow.
  85. Aravamudan, Murali; Naqvi, Shamim A, Protecting communications network integrity.
  86. Shetty, Satish, Protocol-level malware scanner.
  87. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A.; Abdelaziz,Mohamed M., Remote function invocation with messaging in a distributed computing environment.
  88. Robinson,John, Rerouting media to selected media applications.
  89. Sankaranarayan, Mukund; Foltz, Forrest C.; Shaw, George; Sather, Dale A.; Raffman, Andy R.; Srinivasan, Jai; Backman, Terje K.; Parry, William G.; Bakin, David S.; Jones, Michael B.; McDowell, Sean C, Resource manager architecture.
  90. Abdelnur, Alejandro; Gupta, Abhay; Callaghan, Brent, Resource sharing on the internet via the HTTP.
  91. Franco, Roberto A.; Ganjam, Anantha P; Bedworth, John G.; Brundrett, Peter T.; Tokumi, Roland K, Running internet applications with low rights.
  92. Franco, Roberto A.; Ganjam, Anantha P; Bedworth, John G.; Brundrett, Peter T.; Tokumi, Roland K; Epling, Jeremiah S.; Sie, Daniel; Gu, Jianrong; Silbey, Marc; Nallathimmayyagari, Vidya; Tepordei, Bogdan, Running internet applications with low rights.
  93. McIlroy M. Douglas (Bernardsville NJ) Reeds James A. (New Providence NJ), Secure file handling in a computer operating system.
  94. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  95. Bond Barry ; Bharati Sudeep, Security enhancement for untrusted executable code.
  96. Jensenworth Gregory ; Garg Praerit ; Swift Michael M. ; Goertzel Mario C. ; Chan Shannon J., Security model using restricted tokens.
  97. Golan Gilad,ILX, Security monitor.
  98. Vernon Ralph Austel ; Paul Ashley Karger ; David Claude Toll, Security policy for protection of files on a storage device.
  99. Elvanoglu,Ferhan; Dujari,Rajeev, Security settings for markup language elements.
  100. Moreh Jahanshah ; Olkin Terry M., Security system for event based middleware.
  101. Davis, Mark C.; Hind, John R.; Peters, Marcia L.; Topol, Brad B., Selective data encryption using style sheet processing.
  102. Hind, John R.; Peters, Marcia L.; Topol, Brad B., Selective data encryption using style sheet processing for decryption by a client proxy.
  103. Davis, Mark C.; Hind, John R.; Peters, Marcia L.; Topol, Brad B., Selective data encryption using style sheet processing for decryption by a group clerk.
  104. Hind, John R.; Peters, Marcia L.; Topol, Brad B., Selective data encryption using style sheet processing for decryption by a key recovery agent.
  105. Magee James Michael ; Rawson ; III Freeman L. ; Youngworth Christopher Dean, Shared memory support method and apparatus for a microkernel data processing system.
  106. Kikinis Dan, Simplified-file hyper text protocol.
  107. Gadi, Guy, Single sign-on for a network system that includes multiple separately-controlled restricted access resources.
  108. Ogaki Hirokazu (Nagoya JPX) Kato Yoshibumi (Nagoya JPX) Furukawa Satoshi (Suzuka JPX), Software vending system.
  109. Hinton, Heather Maria; Moran, Anthony Scott; Falola, Dolapo Martin; Milman, Ivan Matthew; Wardrop, Patrick Ryan, Specializing support for a federation relationship.
  110. Hartrick Thomas V. (Gaithersburg MD) Higgins Patricia E. (Gaithersburg MD) Sabia Nicholas J. (Silver Spring MD), Structured document tags invoking specialized functions.
  111. Touboul Shlomo,ILX ; Gal Nachshon,ILX, System and method for attaching a downloadable security profile to a downloadable.
  112. Duffy, Catherine M.; Estrada, Julio; Estrada, Miguel A.; Shore, Maurice B., System and method for browser creation and maintenance of forms.
  113. Estrada, Julio; Estrada, Miguel A.; Shore, Maurice B., System and method for browser definition of workflow documents.
  114. Ptacek, Thomas Henry; Newsham, Timothy Nakula; Friedrichs, Oliver, System and method for building an executable script for performing a network security audit.
  115. Estrada, Julio; Estrada, Miguel A.; Kraenzel, Carl J.; Shore, Maurice B., System and method for client replication of collaboration space.
  116. Brown Ross M. ; Greenberg Richard G., System and method for controlling access to data entities in a computer network.
  117. Jacobs, Lawrence; Liu, Xiang; Nakhoda, Shehzaad; Mishra, Rajiv; Zeng, Zheng; Desai, Sachin, System and method for customizing cached data.
  118. Srivastava,Biplav; Nanavati,Amit A.; Batra,Vishal S; Bhide,Manish A; Kamesam,Pasumarti V, System and method for dynamic exception handling using an external exception handler.
  119. Hamel,Larry, System and method for implementing click-through for browser executed software including ad proxy and proxy cookie caching.
  120. Brender Ronald F. (Hollis NH) Iles Michael V. (Basingstoke GB2), System and method for jacketing cross-domain calls in a multi-code execution and debugging system within a multi-archite.
  121. Estrada, Julio; Estrada, Miguel A.; Shore, Maurice B., System and method for online/offline uninterrupted updating of rooms in collaboration space.
  122. Touboul Shlomo,ILX, System and method for protecting a computer and a network from hostile downloadables.
  123. Rozman,Allen F; Cioffi,Alfonso J, System and method for protecting a computer system from malicious software.
  124. Snavely, Amy J.; Sjostrom, William M.; Musa, Mark A., System and method for providing a role table GUI via company group.
  125. Goldberg, Motti; Kenyon, Jeffrey D.; Winkel, Edwin K., System and method for retrieving documents responsive to a given user's role and scenario.
  126. Estrada, Julio; Estrada, Miguel A.; Shore, Maurice B., System and method for room decoration and inheritance.
  127. Marianne Mueller ; David Connelly, System and method for securing a program's execution in a network environment.
  128. Thomas Henry Ptacek ; Timothy Nakula Newsham ; Oliver Friedrichs, System and method providing custom attack simulation language for testing networks.
  129. Freund Gregor, System and methodology for managing internet access on a per application basis for client computers connected to the int.
  130. Notani Ranjit N. ; Mayer John E. ; Hilerio Israel, System and process for inter-domain interaction across an inter-domain connectivity plane.
  131. Notani Ranjit N. ; Mayer John E., System and process for inter-domain planning analysis and optimization using model agents as partial replicas of remote.
  132. Bodin William Kress (Boca Raton FL) Hyde David Michael (Boca Raton FL) Lay Tatchi Placido (Boca Raton FL) Wilkinson James (Southampton GBX) Yee Susan (Coral Springs FL), System for locking down part of portion of memory and updating page directory with entry corresponding to part of portio.
  133. Wakayama, Toshihiro, System for managing networked information contents.
  134. Weber Jay C., System, method and article of manufacture for verifying the operation of a remote transaction clearance system utilizing.
  135. Berger David A. ; Weber Jay C. ; Madapurmath Vilas I., System, method and article of manufacture for virtual point of sale processing utilizing an extensible, flexible archite.
  136. Weber,Michael D.; Shah,Viren R.; Ren,Chuangang, Systems and methods for detecting software security vulnerabilities.
  137. Green,Jeffrey; Gartside,Paul N; Bolin,Chris, Systems and methods for making electronic files that have been converted to a safe format available for viewing by an intended recipient.
  138. Kikinis, Dan, Tailoring data and transmission protocol for efficient interactive data transactions over wide-area networks.
  139. Mason, Carlton Keith, Test programs for enterprise web applications.
  140. Luckenbaugh Gary L. ; Stoakes Forrest E., Trusted services broker for web page fine-grained security labeling.
  141. Bender,Michael S.; Stoltz,Benjamin H., Using token-based signing to install unsigned binaries.
  142. Haverstock, Paul; Estrada, Miguel; Estrada, Julio, Web server enabling browser access to HTML and Non-HTML documents.
  143. Angert Joseph C., pad encryption method and software.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로