Method, system and computer program product for enforcing privacy policies

L Koved, M Pistoia - US Patent 7,877,812, 2011 - Google Patents
A method for enforcing privacy policies associated with data. The method includes
accessing a database to identify labeled data in the database, the labeled data associated …

Protection and communication abstractions for web browsers

JH Wang, X Fan, CE Jackson, JR Howell… - US Patent 10,019,570, 2018 - Google Patents
Abstract Systems and methodologies for accessing resources associated with a Web-based
application in accordance with one or more embodiments disclosed herein may include a …

Communication across domains

S Isaacs, G Moore, D Thorpe… - US Patent 8,185,737, 2012 - Google Patents
2003/0002526 A1 1/2003 Dias et al. 2005/0256924 A1 11/2005 Chory et al. 2003/0014659
A1 1/2003 Zhu 2005/0259655 A1 11/2005 Cuervo et al. 2003/0023445 A1 1/2003 Trifon …

Method and devices for managing permission requests to allow access to a computing resource

MA Carrara, DJ Major, NP Adams… - US Patent 8,763,080, 2014 - Google Patents
Methods and devices for managing permission requests to allow access to a computing
resource are disclosed herein. In one example embodiment, the method comprises: for an …

Online ad serving

X Fan, HJ Wang, JD Dunagan, MA Malik… - US Patent App. 12 …, 2009 - Google Patents
Online ad hosting (eg, hosting ads from one domain on a webpage from a different domain)
is accomplished using a cross-domain frame (eg, an inline frame (IFrame)), a secure inter …

Methods and devices for controlling access to computing resources

MA Carrara, DJ Major - US Patent 8,650,550, 2014 - Google Patents
Methods and devices for controlling access to resources are disclosed herein. In one
example embodiment, the method comprises: executing an application at a first computing …

Running internet applications with low rights

RA Franco, AP Ganjam, JG Bedworth… - US Patent …, 2011 - Google Patents
4,227,253 A 10, 1980 EhrSam et al. 4,984.272 A 1/1991 McIlroy et al. 5,210,874 A 5/1993
Karger 5,339,422 A 8, 1994 Brender et al. 5,377,188 A 12, 1994 Seki 5,428,529 A 6, 1995 …

Security authorization queries

BB Dillaway, MY Becker, AD Gordon… - US Patent …, 2011 - Google Patents
In an example implementation, a bifurcated security scheme has a first level that does not
allow usage of negations and a second level that does permit usage of negations. In another …

Online ad serving

X Fan, JD Dunagan, HJ Wang - US Patent App. 12/147,620, 2009 - Google Patents
BACKGROUND [0001] In a computing environment, Websites and associ ated Webpages
often host online advertisements, intended to be vieWed by online users of the respective …

Security language expressions for logic resolution

MY Becker, BB Dillaway, C Fournet… - US Patent …, 2015 - Google Patents
A security language expresses assertions and authorization queries in a manner that
facilitates logic resolution. In an example implementation, assertion syntax and authorization …