专利摘要:
data maintainer subsystem and browser privacy protection method. The present invention relates to a recoverable private browsing session that is activated on a network computing device communicatively coupled via a network to other network computing devices. the private browsing session constrainedly saves one or more network browsing memories corresponding to activity between the network computing device and other network computing devices. the one or more web browsing memories are strictly saved under the protection of a private credential. after the private browsing session has ended, access to the private browsing session is blocked unless an incoming credential submission matches the private credential. if the received credential submission matches the private credential, the private browsing session is retrieved with access to one or more web browsing memories.
公开号:BR112013019537B1
申请号:R112013019537-1
申请日:2012-01-24
公开日:2021-06-22
发明作者:Berk C. Celebisoy
申请人:Microsoft Technology Licensing, Llc;
IPC主号:
专利说明:

BACKGROUND
[0001] Internet browsers and other applications can be used by network computing devices to access information saved on other network computing devices that are remotely located. For example, websites served by remote computers can be browsed, data stored by remote computers can be downloaded, and email messages can be sent to and received from remote servers. Each of these interactions between remotely located network computers is a potential network browsing memory. SUMMARY
[0002] This Summary is provided to present a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the matter claimed, nor is it intended to be used to limit the scope of the matter claimed. Furthermore, the claimed subject matter is not limited to implementations that solve any or all of the disadvantages noted in any part of this description.
[0003] A private browsing session is activated on a network computing device communicatively coupled through a network to other network computing devices. The private browsing session constrainedly saves one or more network browsing memories corresponding to activity between the network computing device and other network computing devices. The one or more web browsing memories are strictly saved under the protection of a private credential. After the private browsing session ends, access to the private browsing session is blocked unless an incoming credential submission matches the private credential. If the received credential submission matches the private credential, the private browsing session is retrieved with access to one or more web browsing memories. BRIEF DESCRIPTION OF THE DRAWINGS
[0004] FIG. 1 shows a method of establishing browser privacy via recoverable private browsing sessions in accordance with an embodiment of the present description.
[0005] FIG. 2 shows a method of maintaining browser privacy via recoverable private browsing sessions in accordance with an embodiment of the present description.
[0006] FIG. 3 shows an exemplary web browser in accordance with an embodiment of the present description.
[0007] FIG. 4 shows a credential validation interface in accordance with an embodiment of the present description.
[0008] FIG. 5 shows a decision user interface in accordance with an embodiment of the present description.
[0009] FIG. 6 schematically shows a computing system in accordance with an embodiment of the present description. DETAILED DESCRIPTION
[00010] According to the present description, a user is able to recover to a private Internet browsing session after the browsing session is interrupted. As such, the time and effort a user puts into a private browsing session is not wasted if the private browsing session is interrupted. Rather than erasing all traces of network activity by interrupting the private browsing session, the activity of the private browsing session is saved under the protection of a private credential, such as a password. The user can use the private credential to retrieve the saved private browsing session later. Due to the fact that the browsing session is saved under the protection of a private credential, the browsing session can be kept private from unauthorized groups without access to the private credential. Furthermore, due to the fact that the browsing session is saved and can be accessed after it has been stopped, the user can accumulate and/or review browsing information from any number of different browsing sessions, regardless of how much time elapses between browsing sessions.
[00011] FIG. 1 shows an example method 10 of establishing browser privacy via recoverable private browsing sessions. Method 10 can be performed by a network computing device communicatively coupled to other network computing devices. As a non-limiting example, a network computing device in the form of a personal computer or a mobile communication device can be communicatively coupled via the Internet to other network computing devices in the form of server computers. In such a case, the personal computer or mobile communication device may include a browser application programmed to allow recoverable private browsing sessions. Personal computers and mobile communication devices are non-limiting examples of suitable network computing devices, and the Internet is a non-limiting example of a suitable network. A more general description of compatible network computing devices and networks is provided below in reference to FIG. 6.
[00012] At 12, method 10 includes determining whether a private browsing session should be enabled. If a private browsing session must be activated (Yes on 12), method 10 proceeds to 14, and the private browsing session is activated. If a private browsing session should not be activated (Not in 12), method 10 proceeds to 16, and an unrestricted public browsing session is activated. In other words, both a private browsing session and an unrestricted public browsing session can be selectively enabled. Non-limiting examples of such selection are provided below with reference to FIGS. 3 and 5.
[00013] As indicated in 18, when a private browsing session is activated, the private browsing session restrictedly saves one or more network browsing memories. As used herein, a web browser memory refers to any of the information that can be saved corresponding to activity between the network computing device and other network computing devices. Non-limiting examples of web browsing memories include, but are not limited to: browser history (eg list of websites visited during a private browsing session), browser bookmarks, network download downloads, contact information ( eg v cards saved and/or updated during a private browsing session), communication information (eg email messages, SMS messages), VOIP recordings, chat transitions, chat recordings audio and/or video chat, etc.), user preferences (eg browser settings), temporary internet files, browser cookies, browser auto-completion information, user notes, web page annotations. user, and the like.
[00014] Such web browsing memories can be restrictedly saved for a private browsing session. In other words, web browsing memories can be saved under the protection of a private credential so that only users who can supply that private credential can access the restrictedly saved web browsing memories. In some arrangements, the private credential can take the form of a password. In other embodiments, a private credential may take the form of a biometric credential (eg, fingerprint, voice pattern, etc.), a synchronized code provided by an electronic key with magnetic sensor, or other suitable mechanism to provide private access .
[00015] A user can preserve two more different private browsing sessions without departing from the scope of this description. In other words, each private browsing session may be one of a plurality of different private browsing sessions, and each private browsing session may constrainedly save one or more web browsing memories separate from the web browsing memories for other sessions of private browsing. As an example, a user can separate the search for two different projects into two different private browsing sessions. As such, when a user retrieves a particular private browsing session for a particular search project, only the web browsing memories corresponding to that particular search project will be retrieved.
[00016] In some modalities, each private browsing session can be saved in a restricted way under the protection of a different password. In some modalities, each private browsing session or a set of private browsing sessions can be restrictedly saved under the protection of a shared master credential - for example, a single master credential can be used to access any of the browsing sessions that user's privacy, which may or may not be additionally protected by session-specific private credentials.
[00017] A private browsing session and its corresponding network browsing memories can be saved locally on the network computing device. When saved locally, the saved data can be encrypted or otherwise kept securely such that the saved data cannot be accessed without the private credential.
[00018] In some embodiments, a private browsing session and its corresponding browsing memories can be remotely saved to a remote network computing device. The private browsing session can be saved as part of a network-accessible user account, for example. Saved data can be encrypted or otherwise stored securely. When remotely saved, the private browsing session can be retrieved from any compatible network computing device that has access to the network accessible user account and/or the remote network computing device. Thus, a user can start a private browsing session on a first device (eg a home computer) and then subsequently retrieve the same private browsing session on a second device (eg a work computer).
[00019] One or more suitable data structures can be used to save the web browsing memories. Different web browsing memories can be wrapped in a container or saved independently. In some embodiments, a data structure that serves as an index can be saved as part of the private browsing session.
[00020] As indicated in 20, when an unrestricted public browsing session is enabled, the public browsing session can unrestrictedly save one or more web browsing memories. When saved, such web browsing memories are not saved under the protection of a private credential. Unrestricted web browsing memories can be accessed by any user with access to the network computing device. As such, the public browsing session is not private. However, when such web browsing memories are saved in an unrestricted way, the public browsing session can be recovered if it is interrupted. In some modalities, an unrestricted public browsing session does not save the web browsing memories for access retrieved after interruption.
[00021] As shown above, a user can choose whether a browsing session will be public or private. As such, the user can use a computing device while maintaining a desired level of privacy. Furthermore, the user can share the computing device, and even the user account, without exposing web browsing memories that the user wishes to keep secret.
[00022] FIG. 2 shows a method 30 for maintaining browser privacy through recoverable private browsing sessions. At 32, method 30 optionally includes hiding the existence of the private browsing session. In other words, a web browser and/or other application can be configured to hide whether or not the private browsing session has been saved so that unauthorized users are not even alerted to the presence of a private browsing session.
[00023] At 34, method 30 includes receiving a credential submission. As a non-limiting example, FIG. 3 shows an example web browser 50 that includes a user interface option 52 that allows a user to attempt to retrieve a private browsing session. In the illustrated example, the UI option 52 does not indicate whether the private browsing session was created or not, thus hiding the existence of any of the existing private browsing sessions.
[00024] As shown in FIG. 4, upon selection of user interface option 52 of FIG. 3, the user can be presented with a credential validation interface 60. In the illustrated example, the private credential is a password, and thus the credential validation interface 60 is a password input interface. In other embodiments, credential validation may include a fingerprint verification or other form of authentication. The password entered via the credential validation interface 60 can be received by a web browser 50 or other applicable authentication/validation tester. It should be understood that the interfaces above are provided as examples and are not intended to be limiting in any way.
[00025] Returning to FIG. 2, at 36, method 30 includes determining whether a credential submission matches the private credential for a private browsing session or a set of private browsing sessions. For example, the password a user enters through the credential validation interface 60 of FIG. 4 can be compared to the private credential that protects a specific private browsing session or the private credential that protects a set of two or more private browsing sessions.
[00026] In number 38, if the credential submission does not match the private credential (Not in 36), method 30 includes blocking access to the private browsing session. While FIG. 2 shows an access being blocked in response to a credential submission that does not match the private credential, it should be understood that access is also blocked if no credential submission is made. In other words, after the private browsing session is ended, access to the private browsing session is blocked unless an incoming credential submission matches the private credential.
[00027] Accordingly, if the credential submission matches the private credential (Yes on 36), at 40, method 30 includes retrieving the private browsing session with access to one or more web browsing memories. When the private browsing session is recovered, the network computing device can automatically load the network browsing memories to provide the user with the same experience as the user would have if the user had not interrupted the recovered private browsing session. As non-limiting examples, previously saved bookmarks can be made available, browser history can be restored, previously downloaded files can be made visible and accessible, etc. On the other hand, if the private browsing session is not recovered, access to such web browsing memories remains blocked.
[00028] In addition to retrieving a private browsing session, a user can perform administrative maintenance for multiple private browsing sessions if the credential submission matches the private credential. As a non-limiting example, a user can delete one or more private browsing sessions and the corresponding network browsing memories. Such private browsing sessions can be deleted from a local network computing device and/or remote network computing device. Once erased in this way, the erased web browser memories are not accessible, even if a subsequent credential submission matches the private credential that was used to protect those web browser memories.
[00029] In some modalities, the private browsing session can be selectively activated before the private browsing session starts. As a non-limiting example, FIG. 3 shows an example web browser 50 that includes a user interface option 54 that allows a user to proactively activate a private browsing session. A user can proactively activate a private browsing session at the beginning of the browsing session, in the middle of the browsing session, or at the end of the browsing session. If activated at the beginning or in the middle of the browsing session, the user can continue the private browsing and all subsequent network browsing memories can be saved under the protection of a private credential. If activated in the middle or at the end of the browsing session, the web browsing memories that were saved before the private browsing session was activated can be saved under the protection of a private credential.
[00030] In some modalities, the private browsing session can be selectively activated by converting an unrestricted public browsing session to the private browsing session after the unrestricted public browsing session starts. As a non-limiting example, a web browser or other application can entice a user to save an unrestricted public browsing session as a private browsing session. FIG. 5 shows an example user decision interface 70 that may be presented to the user when the user closes a browser window or otherwise indicates that a browsing session is ending. The decision user interface allows the user to specify whether the previous unrestricted public browsing session should be saved as a private browsing session. In such arrangements, if the user indicates that the session should be saved as a private browsing session, then any of the unrestricted web browsing memories of the unrestricted public browsing session can be saved for subsequent restart. Furthermore, access to those web browsing memories can be blocked under the protection of the private credential.
[00031] In some embodiments, the methods and processes described above can be linked to a computing system including one or more computers. In particular, the methods and processes described in this document may be deployed as a computer application, computer service, API computer, computer library and/or other computer program product.
[00032] FIG. 6 schematically shows a non-limiting computing system 80 that can perform one or more of the methods and processes described above (e.g., computing system 80 can serve as the network accessible computing device that runs web browser 50 of the FIG. 3). Computer system 80 is shown in simplified form. It should be understood that virtually any computer architecture can be used without departing from the scope of this description. In different embodiments, the computing system 80 may be in the form of a host computer, server computer, desktop computer, laptop computer, tablet computer, home entertainment computer, mobile computing device, mobile communication device. , gaming device, etc.
[00033] Computer system 80 includes a logic subsystem 82 and a data maintainer subsystem 84. Computer system 80 may optionally include a display subsystem 86, communication subsystem 88, and/or other components not shown in FIG. . 6. Computer system 80 may also optionally include user input devices such as keyboards, mouse, game controllers, cameras, microphones and/or touch screens, for example.
[00034] Logic subsystem 2 can include one or more physical devices configured to execute one or more instructions. For example, the logic subsystem can be configured to execute one or more instructions that are parts of one or more applications, services, programs, routines, libraries, objects, components, data structures, or other logical constructs. Such instructions can be deployed to perform a task, deploy a data type, transform the state of one or more devices, or otherwise achieve a desired result.
[00035] The logic subsystem can include one or more processors that are configured to execute software instructions. Additionally or alternatively, the logic subsystem may include one or more firmware or hardware logic machines configured to execute hardware or firmware instructions. Logic subsystem processors can be single-core or multi-core, and programs running on them can be configured for distribution or parallel processing. The logic subsystem can optionally include individual components that are distributed across two or more devices, which can be remotely located and/or configured for coordinated processing. One or more aspects of the logic subsystem can be virtualized and executed by remotely accessible network computing devices in a cloud computing configuration.
[00036] The data maintainer subsystem 84 may include one or more physical, non-transient devices configured to hold data and/or executable instructions by the logic subsystem to implement the methods and processes described in this document. When such methods and processes are implemented, the state of data holding subsystem 84 can be transformed (eg, to hold different data).
[00037] Data maintainer subsystem 84 may include removable media and/or embedded devices. Data maintaining subsystem 84 may include optical memory devices (e.g., CD, DVD, HD-DVD, Blu-Ray Disc, etc.), semiconductor memory devices (e.g., RAM, EPROM, EEPROM, etc.). ) and/or magnetic memory devices (eg hard disk drive, floppy disk drive, tape drive, MRAM, etc.) among others. Data maintaining subsystem 84 may include devices with one or more of the following characteristics: volatile, non-volatile, dynamic, static, read/write, read-only, random access, sequential access, location addressable, file addressable, and content addressable. In some embodiments, logic subsystem 82 and data maintainer subsystem 84 may be integrated into one or more common devices, such as an application-specific integrated circuit or a system on a chip.
[00038] FIG. 6 also shows an aspect of the data maintaining subsystem in the form of removable computer readable storage media 90 which can be used to store and/or transfer executable data and/or instructions to implement the methods and processes described herein. Removable computer-readable storage media 90 may take the form of CDs, DVDs, HD-DVDs, Blu-Ray Discs, EEPROMs, and/or floppy disks, among others.
[00039] It should be verified that the data keeper subsystem 84 includes one or more physical and non-transient devices. In contrast, in some embodiments, aspects of the instructions described in this document may be transiently propagated by a pure signal (eg, an electromagnetic signal, an optical signal, etc.) that is not maintained by a physical device by hair. minus a finite duration. Furthermore, data and/or and other forms of information referring to the present description may be propagated by a pure signal.
[00040] When included, display subsystem 86 can be used to present a visual representation of data held by data holding subsystem 84. As the methods and processes described in this document change the data held by the data holding subsystem, and then transform the state of the data-maintaining subsystem, the state of the display subsystem 86 can also be transformed to visually represent changes in the underlying data. Display subsystem 86 can include one or more display devices utilizing virtually any type of technology. Such display devices may be combined with logic subsystem 82 and/or data holding subsystem 84 in a shared compartment, or such display devices may be peripheral display devices.
[00041] When included, communication subsystem 88 may be configured to communicatively couple computing system 80 to one or more other computing devices. Computing subsystem 88 may include wired or wireless communication devices with one or more different communication protocols. As non-limiting examples, the communication subsystem can be configured to communicate through a wireless telephone network, a wireless local area network, a wired local area network, a wireless wide area network, a network wide area wired, etc. In some embodiments, the communication subsystem may allow computer system 80 to send and/or receive messages to and/or from other devices over a network such as the Internet. Furthermore, communication subsystem 88 can be used to download executable instructions from remote computing devices. As an example, instructions used to perform the methods described above can be saved to and distributed from a remote server computer, and such instructions can be downloaded from the remote server computer to the data maintaining subsystem 84 via the subsystem of communication 88.
[00042] It should be understood that the configurations and/or approaches described in this document are exemplary in nature, and that these specific modalities or examples should not be considered in a limiting sense, because numerous variations are possible. The specific routines or methods described in this document may represent one or more of several processing strategies. As such, several illustrated acts can be performed in the illustrated sequence, in other sequences, in parallel or, in some cases, omitted. Likewise, the order of the processes described above can be changed.
[00043] The subject matter of the present description includes all innovative and non-obvious combinations and sub-combinations of the various processes, systems and configurations, and other features, functions, acts, and/or properties described in this document, as well as any and all of the equivalents thereof.
权利要求:
Claims (15)
[0001]
1. Data-maintaining subsystem (84) that maintains executable instructions by a logic subsystem (82), characterized in that it performs the computer-implemented steps of: selectively activating both an unrestricted public browsing session and a session of private browsing on a network computing device communicatively coupled through a network to other network computing devices, with the private browsing session being restrictedly saved, under the protection of a private credential, one or more web browsing memories that correspond to activity between the network computing device and other network computing devices; after the private browsing session is ended, block access to the private browsing session unless a credential submission received matches the private credential; and if the received credential submission matches the private credential, retrieving the private browsing session with the one or more web browsing memories; and where the private browsing session is selectively enabled before the private browsing session begins and the existence of the private browsing session is hidden until an incoming credential submission matches the private credential.
[0002]
2. Data maintaining subsystem (84), according to claim 1, characterized in that access to the private browsing session is blocked unless a received credential submission matches the private credential and resumes the browsing session with access to one or more web browsing memories.
[0003]
3. Data maintainer subsystem (84), according to claims 1 or 2, characterized by the fact that the private browsing session is resumed by automatically loading the browsing memories on the network.
[0004]
4. Data maintaining subsystem (84), according to any one of claims 1 to 3, characterized in that the network browsing memories are saved in a restricted way in at least one of the network computing devices and one device network computing as part of a network-accessible user account.
[0005]
5. Data maintaining subsystem (84) according to any one of claims 1 to 4, characterized in that the web browsing memories include at least a browser history, browser bookmarks, network downloads, information from auto-complete and browser cookies.
[0006]
6. Data maintaining subsystem (84), according to any one of claims 1 to 5, characterized in that the network browsing memories include at least one of the contact information, communication information and user preferences.
[0007]
7. Data maintaining subsystem (84), according to any one of claims 1 to 6, characterized in that the private browsing session is one of a plurality of private browsing sessions, each private browsing session saving in a way restricted one or more web browsing memories, in addition to the restricted web browsing memories for other private browsing sessions.
[0008]
8. Data maintainer subsystem (84), according to claim 6, characterized by the fact that each private browsing session is saved in a restricted way under protection of a different password.
[0009]
9. Data keeper subsystem (84), according to claim 6, characterized by the fact that each private browsing session is saved in a restricted way under the protection of a shared main credential.
[0010]
10. Data maintaining subsystem (84), according to any one of claims 1 to 9, characterized in that the private browsing session is selectively activated by converting an unrestricted public browsing session into the browsing session private after the start of the unrestricted public browsing session and where any unrestricted network browsing memories of the unrestricted public browsing session are saved under the protection of the private credential after the unrestricted public browsing session is converted to the session. private browsing.
[0011]
11. Data maintaining subsystem (84) according to any one of claims 1 to 10, characterized in that when the unrestricted public browsing session is activated, the unrestricted public browsing session can be converted into the private browsing according to a user's decision.
[0012]
12. Method for protecting browser privacy, characterized in that it comprises: selectively activating an unrestricted public browsing session (16) or a private browsing session (14) on a form-coupled network computing device communicative over the network to other network computing devices, the private browsing session by strictly saving (18), under the protection of a private credential, one or more network browsing memories corresponding to activity between the network computing device and other network computing devices; after the end of the private browsing session, blocking access (36) to the private browsing session, unless a received credential submission (34) matches the private credential; and if sending the received credential matches the private credential, restarting (40) the private browsing session to automatically load one or more web browsing memories; where the private browsing session is selectively enabled before the private browsing session begins and the existence of the private browsing session is hidden until an incoming credential submission matches the private credential.
[0013]
13. Method according to claim 12, characterized in that access to the private browsing session is blocked unless a received credential submission matches the private credential and resumes the private browsing session with access to one or more web browsing memories.
[0014]
14. Method according to claim 12 or 13, characterized in that the private browsing session is resumed by automatically loading the network browsing memories.
[0015]
15. Computing system (80), characterized by the fact that it comprises: a logical subsystem (82); and a data-maintaining subsystem (84) according to any one of claims 1 to 11, wherein the data-maintaining subsystem (84) contains instructions that are executable by the logic subsystem (82).
类似技术:
公开号 | 公开日 | 专利标题
BR112013019537B1|2021-06-22|DATA MAINTAINING SUBSYSTEM, METHOD TO PROTECT BROWSER PRIVACY AND COMPUTING SYSTEM
US10032033B2|2018-07-24|Systems and methods for protecting backed-up data from ransomware attacks
JP5900911B2|2016-04-06|File system access for one or more sandboxed applications
US9514309B1|2016-12-06|Systems and methods for protecting files from malicious encryption attempts
JP2013530454A|2013-07-25|Host device and method for accessing storage device virtual files by bypassing the host device cache
JP5579274B2|2014-08-27|Storage device and method using virtual file in public memory area to access multiple protected files in private memory area
US9436814B2|2016-09-06|Fail-safe licensing for software applications
JP6046745B2|2016-12-21|Invalid escrow key detected
US9405925B2|2016-08-02|Content item encryption on mobile devices
US20170373853A1|2017-12-28|Managing user profiles securely in a user environment
US9292691B1|2016-03-22|Systems and methods for protecting users from website security risks using templates
US9659182B1|2017-05-23|Systems and methods for protecting data files
US9887979B1|2018-02-06|Systems and methods for enabling users to launch applications without entering authentication credentials
WO2021188716A1|2021-09-23|Systems and methods for protecting a folder from unauthorized file modification
JP2011138514A|2011-07-14|Method and device for detecting if computer file has been copied, and method and device for enabling the detection
Bing et al.2017|Android System Partition to Traffic Data?
同族专利:
公开号 | 公开日
US8499341B2|2013-07-30|
WO2012106138A2|2012-08-09|
RU2597512C2|2016-09-10|
CN102622408A|2012-08-01|
MX348255B|2017-06-05|
KR20140004164A|2014-01-10|
EP2671185B1|2020-07-22|
CA2825948C|2018-09-25|
HK1174699A1|2013-06-14|
JP5922152B2|2016-05-24|
WO2012106138A3|2012-10-26|
AU2012212549B2|2017-02-02|
CA2825948A1|2012-08-09|
KR101896132B1|2018-09-07|
EP2671185A4|2017-08-09|
CN102622408B|2014-09-03|
MX2013008788A|2014-01-08|
US20120198524A1|2012-08-02|
EP2671185A2|2013-12-11|
RU2013136043A|2015-02-10|
JP2014503921A|2014-02-13|
BR112013019537A2|2016-10-04|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

US6411989B1|1998-12-28|2002-06-25|Lucent Technologies Inc.|Apparatus and method for sharing information in simultaneously viewed documents on a communication system|
US7437550B2|1999-12-02|2008-10-14|Ponoi Corp.|System for providing session-based network privacy, private, persistent storage, and discretionary access control for sharing private data|
AU3974601A|2000-02-07|2001-08-14|Dahong Qian|Group-browsing system|
US7526762B1|2000-06-30|2009-04-28|Nokia Corporation|Network with mobile terminals as browsers having wireless access to the internet and method for using same|
US20030195963A1|2002-04-10|2003-10-16|Yu Song|Session preservation and migration among different browsers on different devices|
US20050066037A1|2002-04-10|2005-03-24|Yu Song|Browser session mobility system for multi-platform applications|
JP2004118464A|2002-09-25|2004-04-15|Sharp Corp|Data communication device|
JP2006058990A|2004-08-18|2006-03-02|Fuji Xerox Co Ltd|Information processing method and portable memory medium|
ES2741895T3|2005-09-26|2020-02-12|Telefonica Germany Gmbh & Co Ohg|Method to control a browser window|
US20070233880A1|2005-10-20|2007-10-04|The Trustees Of Columbia University In The City Of New York|Methods, media and systems for enabling a consistent web browsing session on different digital processing devices|
CA2649305C|2006-04-10|2014-05-06|Trust Integration Services B.V.|Arrangement of and method for secure data transmission|
US20080052641A1|2006-06-26|2008-02-28|Sun River Systems, Inc.|System and method for secure and private media management|
JP4992511B2|2007-03-30|2012-08-08|日本電気株式会社|Web service identification information utilization system, and apparatus, method, and program used therefor|
US8849914B2|2007-12-20|2014-09-30|The Vanguard Group, Inc.|System and method for synchronized co-browsing by users in different web sessions|
US8789198B2|2011-01-14|2014-07-22|International Business Machines Corporation|Triggering a private browsing function of a web browser application program|US8560604B2|2009-10-08|2013-10-15|Hola Networks Ltd.|System and method for providing faster and more efficient data communication|
US8464350B2|2011-03-14|2013-06-11|International Business Machines Corporation|System and method for in-private browsing|
KR20130028375A|2011-09-09|2013-03-19|주식회사 팬택|Mobile apparatus for synchronizing working environment of web browser based on html5 and method thereof|
US9418243B2|2012-06-25|2016-08-16|Google Inc.|Invoking a private browsing mode by selection of a visual control element within a browser tab|
WO2014008528A1|2012-07-13|2014-01-16|1Form Online Pty Ltd|Method and system for secured communication of personal information|
CN103838990A|2012-11-22|2014-06-04|腾讯科技(深圳)有限公司|Data processing method and browser|
US9106652B2|2012-12-18|2015-08-11|International Business Machines Corporation|Web conference overstay protection|
CN104036159A|2013-03-05|2014-09-10|腾讯科技(深圳)有限公司|Browser control method and device of browser terminal|
CN104036160B|2013-03-07|2019-03-15|腾讯科技(深圳)有限公司|A kind of Web browser method, device and browser|
CN104063657A|2013-03-19|2014-09-24|腾讯科技(深圳)有限公司|Method and device for starting private browsing, browser and electronic equipment|
US9241044B2|2013-08-28|2016-01-19|Hola Networks, Ltd.|System and method for improving internet communication by using intermediate nodes|
US9166982B1|2013-10-11|2015-10-20|Flat World Knowledge, Inc.|System and method for providing access to educational content in private browsing mode|
US9602609B2|2014-03-28|2017-03-21|Google Inc.|Incognito mode in a media application|
CN106105090B|2014-04-14|2019-10-22|迈克菲股份有限公司|Automated log on is shared using session and publishes session|
US10156967B2|2014-05-31|2018-12-18|Apple Inc.|Device, method, and graphical user interface for tabbed and private browsing|
US10671275B2|2014-09-04|2020-06-02|Apple Inc.|User interfaces for improving single-handed operation of devices|
US11057446B2|2015-05-14|2021-07-06|Bright Data Ltd.|System and method for streaming content from multiple servers|
US10536556B2|2016-05-19|2020-01-14|Microsoft Technology Licensing, Llc|Automation of browsing mode switching|
US10706175B2|2016-06-10|2020-07-07|Nirvon Shoa|Method and apparatus for hiding private browsing data|
CN106529257B|2016-11-25|2019-08-20|维沃移动通信有限公司|A kind of information processing method and mobile terminal|
US10332517B1|2017-06-02|2019-06-25|Amazon Technologies, Inc.|Privacy mode based on speaker identifier|
US11190374B2|2017-08-28|2021-11-30|Bright Data Ltd.|System and method for improving content fetching by selecting tunnel devices|
EP3472717B1|2017-08-28|2020-12-02|Luminati Networks Ltd.|Method for improving content fetching by selecting tunnel devices|
CN107682538A|2017-09-27|2018-02-09|北京小米移动软件有限公司|The display methods and device of application interface|
EP3750079A4|2019-02-25|2022-01-12|Bright Data Ltd|System and method for url fetching retry mechanism|
法律状态:
2017-07-25| B25A| Requested transfer of rights approved|Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC (US) |
2018-03-27| B15K| Others concerning applications: alteration of classification|Ipc: G06F 21/62 (2013.01), G06F 17/30 (2006.01), H04L 2 |
2018-12-18| B06F| Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]|
2019-10-22| B06U| Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]|
2021-01-05| B06A| Notification to applicant to reply to the report for non-patentability or inadequacy of the application [chapter 6.1 patent gazette]|
2021-04-06| B09A| Decision: intention to grant [chapter 9.1 patent gazette]|
2021-06-08| B350| Update of information on the portal [chapter 15.35 patent gazette]|
2021-06-22| B16A| Patent or certificate of addition of invention granted|Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 24/01/2012, OBSERVADAS AS CONDICOES LEGAIS. |
优先权:
申请号 | 申请日 | 专利标题
US13/019,105|2011-02-01|
US13/019,105|US8499341B2|2011-02-01|2011-02-01|Resumable private browsing session|
PCT/US2012/022283|WO2012106138A2|2011-02-01|2012-01-24|Resumable private browsing session|
[返回顶部]