| CPC H04L 63/145 (2013.01) [G06F 3/04842 (2013.01); G06F 21/53 (2013.01); G06F 21/56 (2013.01); G06F 21/568 (2013.01); G06F 21/74 (2013.01); H04L 63/02 (2013.01); H04L 63/1408 (2013.01); G06F 16/986 (2019.01)] | 24 Claims |

|
1. A method, performed by an intermediate device, for prevention of malware infection of a user device, the method comprising:
receiving, from a browser operating on the user device, a first request for a first web page associated with an Internet web site, the browser being capable of rendering the first web page;
transmitting, to a website associated with the requested first web page and in response to the first request, a second request for the first web page;
receiving, responsive to the second request, a first set of data associated with the first web page, the first set of data being in a code domain format;
generating, based on the first set of data in the code domain format, a first set of images, the first set of images representing only all the renderable data of the first set of data in an image format, said generating of said first set of images performed without knowledge of a location or a presence of said malware infection, or code corresponding to said malware infection, within said first set of data in said code domain format, wherein said generating of said first set of images is performed without requiring a malware detection process; and
transmitting, to the browser, in place of the first web page, the first set of images with correlation data configured to enable a user to interact with the first set of images on the user device in a manner that is substantially the same as though the user device had received the first web page in the code domain format and the first web page had been rendered from the code domain format by the browser, wherein said method, performed by said intermediate device, for said prevention of said malware infection of said user device is entirely accomplished via code isolation.
|