US 11,902,334 B2
Proxy services for controlling the persistency, utilization, and dissemination of information provided to a service worker
Itamar Azulay, Mishmar Ayyalon (IL); Ishay Hilzenrat, Tel Aviv (IL); Sharon Itshak Lifshits, Tel Aviv (IL); and Meir Blachman, Beer Sheva (IL)
Assigned to Microsoft Technology Licensing, LLC, Redmond, WA (US)
Filed by MICROSOFT TECHNOLOGY LICENSING, LLC, Redmond, WA (US)
Filed on Jun. 23, 2021, as Appl. No. 17/355,691.
Prior Publication US 2022/0417289 A1, Dec. 29, 2022
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/205 (2013.01) [H04L 63/0281 (2013.01); H04L 63/1416 (2013.01); H04L 63/1425 (2013.01); H04L 63/1475 (2013.01)] 17 Claims
OG exemplary drawing
 
1. A computer-implemented method for controlling information, the method comprising:
receiving, at a security service, a response from a second computing device that includes response data addressed to a first computing device;
identifying, at the security service, sensitive data included in the response data, the response further including caching instructions that instruct a service worker to cache the sensitive data at the first computing device;
in response to identifying the sensitive data, updating, at the security service, the caching instructions to form updated caching instructions that instruct the service worker to exclude the sensitive data from caching at the first computing device;
in response to identifying the sensitive data, including, in an updated response, sandbox instructions that instruct the service worker to isolate the sensitive data in a sandbox implemented at the first computing device; and
transmitting, from the security service to the first computing device, the updated response that includes the response data and the updated caching instructions.