US 12,341,804 B2
Secure browsing via a transparent network proxy
Paul Giura, Cohoes, NY (US); Jeffrey E. Bickford, Somerset, NJ (US); Donald E. Hendrix, Mill Creek, WA (US); Howard F. Shirokmann, Point Pleasant, NJ (US); Thomas A. Anschutz, Conyers, GA (US); and Ching C. Shih, Bridgewater, NJ (US)
Assigned to AT&T Intellectual Property I, L.P., Atlanta, GA (US)
Filed by AT&T Intellectual Property I, L.P., Atlanta, GA (US)
Filed on Oct. 21, 2022, as Appl. No. 17/971,010.
Application 17/971,010 is a continuation of application No. 17/096,007, filed on Nov. 12, 2020, granted, now 11,516,246.
Application 17/096,007 is a continuation of application No. 16/260,420, filed on Jan. 29, 2019, granted, now 10,868,826, issued on Dec. 15, 2020.
Application 16/260,420 is a continuation of application No. 15/808,228, filed on Nov. 9, 2017, granted, now 10,200,403, issued on Feb. 5, 2019.
Application 15/808,228 is a continuation of application No. 15/353,174, filed on Nov. 16, 2016, granted, now 9,882,928, issued on Jan. 30, 2018.
Application 15/353,174 is a continuation of application No. 14/094,258, filed on Dec. 2, 2013, granted, now 9,537,885, issued on Jan. 3, 2017.
Prior Publication US 2023/0045123 A1, Feb. 9, 2023
Int. Cl. H04L 9/40 (2022.01); G06F 9/455 (2018.01); H04L 67/02 (2022.01)
CPC H04L 63/1441 (2013.01) [G06F 9/45558 (2013.01); H04L 63/0245 (2013.01); H04L 63/0281 (2013.01); H04L 63/101 (2013.01); H04L 67/02 (2013.01); G06F 2009/45587 (2013.01); G06F 2009/45595 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method, comprising:
receiving, by a processing system including a processor, a request to access content from a resource over a communication network, wherein the request is received from a browser associated with a communication device of a user;
determining, by the processing system, an identifier associated with the resource;
determining, by the processing system, that the identifier is associated with malicious activity resulting in a determination;
accessing, by the processing system, the content from the resource over the communication network utilizing a browser virtual machine based on the determination, wherein the browser virtual machine is part of a pool of browser virtual machines;
utilizing, by the processing system, the browser virtual machine to filter malicious content associated with the malicious activity from the content, resulting in a rendering of filtered content in a virtual browser;
causing, by the processing system, an address bar of the virtual browser to be removed from the virtual browser, resulting in a modified virtual browser;
providing, by the processing system, a stream of the modified virtual browser with the rendering of the filtered content to a tab of the browser of the communication device of the user, wherein the rendering of the filtered content comprises utilizing, by the processing system, the browser virtual machine to simulate a selected software application;
detecting, by the processing system, exiting or closing of the tab of the browser of the communication device after the providing the stream of the modified virtual browser; and
based on the detecting the exiting or closing of the tab of the browser of the communication device, causing, by the processing system, the browser virtual machine to be released back into the pool of browser virtual machines for use with a different browsing session.