Secure browser-based applications

Techniques are provided for execution of restricted operations by computer program code in web browsers, where the code is permitted to invoke restricted operations if implicit or explicit consent is received. Such techniques may include generating a risk rating for a computer program code component...

Full description

Saved in:
Bibliographic Details
Main Authors GRIGSBY DAVID B, SPENCER STEVEN E, DURAND GORDON, HILAIEL LLOYD T
Format Patent
LanguageChinese
English
Published 26.01.2011
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Techniques are provided for execution of restricted operations by computer program code in web browsers, where the code is permitted to invoke restricted operations if implicit or explicit consent is received. Such techniques may include generating a risk rating for a computer program code component, where the component includes at least one component operation for executing at least one restricted system operation; and prompting a user for permission to execute the restricted system operation, wherein the prompt includes the risk rating and a description of the component operation. The program code may include script code associated with a web page that invokes a web browser plugin, which in turn invokes the restricted system operation. The code may invoke the restricted system operation in response to receiving an input from a user via the web browser, where the input is for causing an action associated with performing the operation, the action implicitly granting consent to perform the operation.
Bibliography:Application Number: CN20098107056