Processing

Please wait...

Settings

Settings

Goto Application

1. EP2975534 - Method and device for secure browsing

Office
European Patent Office
Application Number 14002422
Application Date 14.07.2014
Publication Number 2975534
Publication Date 20.01.2016
Publication Kind A1
IPC
G06F 17/30
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
17Digital computing or data processing equipment or methods, specially adapted for specific functions
30Information retrieval; Database structures therefor
G06F 21/53
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
52during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
53by executing in a restricted environment, e.g. sandbox or secure virtual machine
H04L 29/06
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
H04W 12/02
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
02Protecting privacy or anonymity
CPC
G06F 21/53
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
52during program execution, e.g. stack integrity ; ; Preventing unwanted data erasure; Buffer overflow
53by executing in a restricted environment, e.g. sandbox or secure virtual machine
G06F 16/9577
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
16Information retrieval; Database structures therefor; File system structures therefor
90Details of database functions independent of the retrieved data types
95Retrieval from the web
957Browsing optimisation, e.g. caching or content distillation
9577Optimising the visualization of content, e.g. distillation of HTML documents
G06F 21/6254
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
62Protecting access to data via a platform, e.g. using keys or access control rules
6218to a system of files or objects, e.g. local or distributed file system or database
6245Protecting personal data, e.g. for financial or medical purposes
6254by anonymising data, e.g. decorrelating personal data from the owner's identification
H04L 63/1483
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
14for detecting or protecting against malicious traffic
1441Countermeasures against malicious traffic
1483service impersonation, e.g. phishing, pharming or web spoofing
H04L 63/168
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
16Implementing security features at a particular protocol layer
168above the transport layer
Applicants X AND ME TECHNOLOGY AG
Inventors RÖMPP KRISHNA
Designated States
Priority Data 14002422 14.07.2014 EP
Title
(DE) Verfahren und Vorrichtung zum sicheren Browsen
(EN) Method and device for secure browsing
(FR) Procédé et dispositif de navigation sécurisée
Abstract
(EN)
Provided is a computer implemented method for securely accessing web pages, the method comprises: transmitting from a client browser a request for retrieving a web page; receiving the request from the client browser by a server browser; gathering, by the server browser, a source code and one or more embedded objects of the requested web page, wherein the one or more embedded objects are gathered only if the web page comprises at least one or more embedded objects; rendering, by the server browser, the source code of the web page and generating a DOM, document object model, tree for creating a first visual representation of the web page, wherein the first visual representation comprises the DOM tree and said embedded objects; and transmitting said DOM tree and said embedded objects of the web page from the server browser to the client browser, so that the client browser is able to create a second visual representation of the webpage, wherein the second visual representation is substantially the same as the first visual representation.