Guest browser

ABSTRACT

One embodiment of a guest browser system, among others, includes a guest browser interface configured to provide an address bar interface for accepting a network address for retrieving a first web page. The guest browser interface is rendered from code of a second web page, where content of the second web page is rendered by an installed web browser. The system further includes a guest browser engine configured to retrieve contents of web pages. The guest browser engine is built from code provided by the second web page and is used to update content of the second web page with content from the first web page. Other systems and methods are also provided.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.11/302,642, filed Dec. 14, 2005, now U.S. Pat. No. 9,116,998, thecontent of which is herein incorporated by reference in its entirety.

TECHNICAL FIELD

The present disclosure is generally related to network communicationsand, more particularly, is related to network browsers.

BACKGROUND

A wide variety of applications and software components are ofteninstalled with an operating system of a client device to extend thefunctionality of a web browser installed on the client device. Forexample, to prevent pop-up advertisements, a pop-up blocking applicationmay be installed to monitor requests for opening new windows within thebrowser application. Further, virus protection applications are ofteninstalled to prevent communications received from the Internet or othernetwork sources that may infect and potentially harm operation of theclient device. Such communications may harm not only a localapplication, such as a web browser, but also other applications, such asthe operating system of the host client device, and also other computersin communication with the client device.

Additional types of applications may also be added to extend thefunctionality of conventional web browsers. Each of these types ofapplications may need occasional updating of system files to maintainproper operation. For example, a virus protection application may needupdates on virus definitions and a media player plug-in to a web browsermay need to be updated with new codecs corresponding to new mediaformats.

Plug-in applications allow features to be upgraded using modularcomponents that can selectively replace existing components or add newfeatures to an installed web browser application. In general operation,a web browser receives a request for a particular file and based uponthe file extension (e.g., WAV, MP3, etc.), the browser passes it to aplug-in application that has been registered to handle that format withthe operating system.

From an organizational perspective, however, an organization (such asthat of a corporation) may have a policy on which applications areauthorized to be installed on a client device owned by the organizationand may also have policies on which network locations and web sites thatare authorized to be accessed. Further, the organization may have apolicy on the level of security (e.g., level of virus protection, levelof encryption utilized, etc.) that is to be maintained on the clientdevices that access the organization's network and network resources.Therefore, maintenance of organizational polices across each clientdevice is cumbersome.

Thus, a heretofore unaddressed need exists in the industry to addressthe aforementioned deficiencies and inadequacies.

SUMMARY

Embodiments of the present disclosure provide systems and methods forimplementing a guest browser. Briefly described, one embodiment of aguest browser system, among others, includes a guest browser interfaceconfigured to provide an address bar interface for accepting a networkaddress for retrieving a first web page. The guest browser interface isrendered from code of a second web page, where content of the second webpage is rendered by an installed web browser. The system furtherincludes a guest browser engine configured to retrieve contents of webpages. The guest browser engine is built from code provided by thesecond web page and is used to update content of the second web pagewith content from the first web page.

Embodiments of the present disclosure can also be viewed as providingmethods for implementing a guest browser. In this regard, one embodimentof such a method, among others, can be broadly summarized by thefollowing steps: displaying a guest browser interface having an addressbar for accepting network addresses, the guest browser interface beingdisplayed within an interface of an installed web browser, the guestbrowser interface built from code provided by a web page currently beingrendered by the installed web browser; and updating content of the webpage being currently rendered with content retrieved by a guest browserengine supporting the guest browser interface, the guest browserinterface retrieving content corresponding to a requested web page at anetwork address inputted into the address bar.

Other systems, methods, features, and advantages of the presentdisclosure will be or become apparent to one with skill in the art uponexamination of the following drawings and detailed description. It isintended that all such additional systems, methods, features, andadvantages be included within this description and be within the scopeof the present disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

Many aspects of the disclosure can be better understood with referenceto the following drawings. The components in the drawings are notnecessarily to scale, emphasis instead being placed upon clearlyillustrating the principles of the present disclosure. Moreover, in thedrawings, like reference numerals designate corresponding partsthroughout the several views.

FIG. 1 is a diagram of one embodiment of a graphical interface to aguest browser system of the present disclosure.

FIG. 2 is a diagram depicting exemplary flows of communications withinan installed web browser application utilized within a guest browsersystem of the present disclosure.

FIG. 3 is a diagram depicting exemplary flows of communications of anembodiment of a guest browser module within a guest browser system ofthe present disclosure.

FIG. 4 is a block diagram of various components of one embodiment of aguest browsing system of the present disclosure.

FIGS. 5-7 are diagrams of exemplary graphical interfaces utilized in theguest browser system of FIG. 4.

FIGS. 8-9 are flow chart diagrams describing embodiments of methodsutilized in implementing one embodiment of a guest browser system of thepresent disclosure.

DETAILED DESCRIPTION

FIG. 1 shows one embodiment of a representation of a graphical interfaceutilized in one embodiment of a guest browser system of the presentdisclosure. As shown in FIG. 1, a graphical interface 110 to aninstalled web browser application is displayed. In the figure, theinstalled web browser interface 110 has its own address bar 112, toolbarbuttons 114, and is meant to be representative of a standard web browserapplication, such as web browsers provided by Microsoft InternetExplorer®, Mozilla Firebird®, Apple Safari®, etc.

Within the web page 120 being currently displayed or rendered by theinstalled web browser interface 110 of FIG. 1, a guest browser interface130 is also shown. As shown, the graphical interface 130 also has itsown address bar 132 and may also have other interface options, such astoolbar buttons (not shown) and other graphical interface controls. Forexample, in one embodiment, guest browser logic may maintain a historyor log of locations of web page content that has been previouslydisplayed on the guest browser interface so that previous content may bevisited by a user via a graphical interface control to provide similarfunctionality as a “back” button on an installed browser. In addition,functionality offered by the guest browser interface 130 may surpass thefunctionality of the installed web browser application hosting the guestbrowser interface 130.

Note, with many installed browser applications on a client device, thebrowser application consumes documents or media retrieved from a networkand renders the document onto a browser display 130. Also, virusprotection applications, plug-in modules, extension modules, etc. areinstalled with an operating system of a client device that executes theinstalled web browser in order to extend or enhance functionality of theinstalled web browser.

Referring back to FIG. 1, the address bar 112 of the installed webbrowser interface 110 displays a network address to a web site(“virtualbrowser.com”). Therefore, in this example, the web page 120shown in the web browser interface 110 is retrieved from thevirtualbrowser.com site. For example, the web page 120 for thevirtualbrowser.com site may contain JavaScript or other code that isloaded by an installed browser application to cause the web browserinterface 110 to display or render the guest browser interface 130.Further, the web page 120 from the virtual browser.com web site may alsocause additional components to be loaded by the installed web browserapplication, such as virtual pop-up blocking modules, virtual toolbarmodules, appropriate virtual virus protection modules—all of whichshould be up to date because each has just been loaded and should be thenewest versions available. In one view, the functionality of the guestbrowser interface 130 and accompanying functionality is loaded on-demand(e.g., directly when an installed browser application is launched if thevirtualbrowser.com is set as a homepage) without any need to installcomponents with the operating system of the client device. As used inthis example, the term “virtual” is used to describe a software modulethat is being used to add a specific feature or service without beinginstalled on a computer system.

Instructions for retrieving the code that is used to build individualmodules that are loaded by the installed web browser may be provided inthe web page 120 that caused the guest browser module to load. Forexample, the web page 120 may contain a network site where the modulecode may be obtained. A copy of the module code may also be stored in acache for the installed web browser application such that the code maybe retrieved from the cache in subsequent launches of the guest browserinterface 130. Before doing so, the web page 120 may containinstructions to verify that the version of a module located in a localcache is the same as the version of the module being available at anetwork location. Therefore, if a newer version is available, theinstalled web browser application may then download the newest versionavailable.

For example, as represented in FIG. 2, in many installed browserapplications 210, a web request 202 to a web server is made (in responseto a user command) and the request flows 202 from the installed webbrowser 210, through any installed pop-up blocking applications 220 (andother installed plug-ins, toolbars, or other add-ons), and is scanned byan outbound virus protection software 230 previously installed withinthe operating system of the client device. After which, the request 202is presented to the operating system (not represented) and is directedto the network stack 240 of the client device, where the request 202 issent over a network (not represented).

The virus protection software or application 230 acts as a protectivelayer between the web browser application 210 and the operating systemof the client device and the network stack 240 of the client device toprevent malicious or undesired communications from affecting the clientdevice or other machines located on a network (not represented). Thepop-up blocking application 220 and other security measures may also actto prevent undesired information or objects from reaching the operatingsystem of the client device. However, such devices have to be installedto the client machine and continually updated so that they are madeaware of new types of communications, codes, data, objects, etc. thatare capable of harming client components.

When, the response 204 is received from the network (not represented),the response 204 flows through the same path through the add-oncomponents and back to the installed web browser 210. A web page maythen be rendered by the installed web browser application 210.

Next, an embodiment of a guest browser module is described within thecontext of a guest browser system. Generally, a guest browser module maybe viewed as including a graphical interface or a guest browserinterface and a guest browser engine. For example, in an embodiment ofthe guest browser system, a guest browser module performs thefunctionality of an installed web browser 110 without requiringinstallation with an operating system, pre-installation of componentswith the operating system, and may be configured from its creation orinstantiation to comply with an organizational policy.

In one embodiment, the guest browser engine is configured to sendrequests to a web server to retrieve data that is needed at a particulartime (e.g., via using SOAP or some other XML-based web services dialectto communicate with a server and using JavaScript to process the webserver response). This is done in lieu of retrieving a whole web page ofcontent. Thus, the amount of data interchanged between the guest browserengine of the guest browser module and web server is kept minimal. Webserver processing time is also saved, since the guest browser engineperforms much of the processing.

Accordingly, FIG. 3 shows communication flows for one embodiment of aguest browser system where the guest browser system includes guestbrowser module 310. In this representation, an installed web browserapplication 210 loads uninstalled or “virtual” virus protection 330 andplug-in modules 320 in addition to a guest browser module 310.Therefore, a user of the installed web browser 210 may be presented witha guest browser interface 310. In this example, a web request 302 isinitiated from the guest browser module 310 and flows through thevirtual plug-in modules 320 and virus protection module 330 before therequest 302 is relayed to the installed browser application 210. Then,the installed browser application 210 calls the operating system (notrepresented) which passes the request to the network stack 240 of theclient device hosting these components. The response 304 returns fromthe network stack 240 and follows a reverse path back to the guestbrowser module 310. As previously mentioned, no desktop software isinstalled for the guest browser module 310, virtual virus protection330, and/or plug-in modules 320. Accordingly, the virtual virusprotection 330, plug-ins 320, and guest browser 310 are portable acrossoperating systems and browsers that can support the underlying languageconstruct of the respective components.

For example, in one embodiment, a guest browser module 310 isinstantiated using JavaScript code from a web page rendered by theinstalled browser 210 and the guest browser module then makes HTTPrequests to web servers utilizing XMLHTTP or XMLHTTPREQUEST methods andproperties. The guest browser module 310 receives the web serverresponse and then may have other functional modules process theresponse, as described above. Generally, as long as an installed webbrowser 210 supports the XMLHTTP or XMLHTTPREQUEST object, the offeredfunctionality of the guest browser environment is assured of workingwith an installed web browser 210. This is an advantage over having tosolve the coding complexities involved in writing applications directedtoward particular operating systems.

Note that XMLHTTPREQUEST or XMLHTTP is a JavaScript object that issupplied through standard browser implementations, including currentbrowsers Internet Explorer®, Mozilla®, and Safari®, among others.Although some conventional installable plug-ins are not available on allbrowser platforms, such as UNIX-based platforms, virtual modules of thepresent disclosure may be implemented on any installed browser thatsupports JavaScript.

Referring now to FIG. 4, functionality of various components of oneembodiment of a guest browsing system 400 is described. As representedin FIG. 4, during operation of the guest browser system 400, a user of aclient computer 410 activates an installed web browser application 420using, for example, a mouse control. The installed browser 420 may bestored on the hard drive 430 of the client computer 410. For example,the installed browser 420 can be the Netscape Navigator®, MicrosoftInternet Explorer®, Mozilla Firefox®, etc. The installed browser 420 isused for locating and requesting web pages, such as page 440, maintainedat web server 450. The web page 440 is identified by its uniqueaddresses known as Universal Resource Locators (URL), for example,“www.portal.com/user/my-home-page.html.”

The server 450 executes web server software to deliver web pages toclient computers and devices using the HyperText Transport Protocol(HTTP). For example, using the browser 420, the user of the client 410can access the page 440 by specifying the URL of the page 440 in arequest message such as “www.portal.com/user/my-home-page.html.” Inresponse, the server 450 delivers the page 440 to the client 410. Oncethe page 440 arrives at the client 410, it can be viewed on a displayterminal of client device using the installed browser 420.

In one embodiment, the web page 440 includes JavaScript code with anembedded tag that specifies parameters for a guest browser module 460.The guest browser module 460 is a program that provides browsingfunctionality. The guest browser module 460 can be retrieved dynamicallyby the client computer 410 via the network 470 (e.g., a number ofcomputer connected together to share information and hardware, includingwireless and wired communication lines, and may also include, but is notlimited, a network of networks, such as the Internet) and stored in thememory 415 of the client device 410. The guest browser module 460 isexecuted from within the application environment of the installedbrowser 420. Software in the memory 415 also includes a suitableoperating system (O/S) 495. The operating system 495 controls theexecution of other computer programs, such as the installed web browser420, and provides scheduling, input-output control, file and datamanagement, memory management, and communication control and relatedservices.

Advantageously, the guest browser 460 may offer browsing functionalitythat is not evident in the installed browser application 420 itself. Inone embodiment, the guest browser module 460 is a platform-independentprogram that is temporarily loaded along with the page 440. The code ofthe guest browser module 460 is subsequently discarded with the page440.

In one embodiment, the tag specifying the guest browser module 460includes fields that may specify various parameters, including thealignment and dimensions of the display “window” within which thegraphic user interface (GUI) of the guest browser module 460 is tooperate and a location where the code for the guest browser module 460is stored on the network 470. The location can be any computeraccessible via the network 470. The tag specifying the guest browsermodule 460 or another tag within the page 440 may also specify a user'sor a network administrator's preference on what other modules that arepreferred to be dynamically loaded in a similar manner as the guestbrowser module 460.

As an advantage, the user of the client computer 410 does not need anyspecial software other than a standard web browser 420 to operate theguest browser 460. All processing takes place within the applicationenvironment of the installed browser 420 or at various web servers. Toenable the guest browser module 460, the web browser only needs tolocate any web page 440 that is enabled with code for the guest browsermodule 460, as described herein.

Additionally, other module components may also be loaded in a similarfashion as the guest browser module 460. In accordance with the presentdisclosure, it is contemplated that additional modules may be loaded towork in concert with operations of the guest browser module 460.Similarly, to the guest browser module 460, such modules may be loadedtemporarily and executed upon receipt by the installed web browser 420.Such modules include modules for virus protection 480, blocking pop-upadvertisements 485, translations of new file standards 490, encryptionmodules 495, etc., as represented in FIG. 4 and discussed further below.

Next, FIGS. 5-7 help describe a sample session utilizing a guest browsersystem 400, in one embodiment. Within the context of this example, it isassumed that an organizational network provides its users a portal pageas a homepage for each user's installed web browser application 420utilized on a client device 410.

Upon launch of the installed web browser application, a web browseropens a window 510 and retrieves a web page 520 to the portal site (ataddress www.portal.com/user/my-home-page.html), as shown in FIG. 5. Theweb page 520 contains JavaScript that constructs a guest browser module.From a cookie that is presented by the user or some other mechanism,components preferred by the user may be retrieved from a virtual libraryat the portal site and downloaded by the installed web application 420.Therefore, in response to retrieving and displaying the portal page 520,the portal page 520 causes the guest browser module to be retrievedalong with other preferred components, such as virus protection module480 (with current virus definitions), pop-up blocking module 485, etc.

The guest browser interface 530 within the retrieved portal page 520 mayresemble a standard browser interface and contain an address bar 532.Therefore, if a user would like to go to a particular web site, the usermay enter the address for the web site in the address bar 532 of theguest browser interface 530 and then “enter” a command (e.g., via akeyboard stroke, mouse click, etc.) so that the guest browser acceptsthe entered address. In the representation of FIG. 2, a user may selectthe GO button 534.

In one embodiment, the web request is examined by the pop-up blockingmodule logic to determine if the URL address is a valid and authorizedweb site. If the web site is not valid, the request does not leave theinstalled web application 420. Accordingly, in some embodiments, virtualmodules may be loaded by the web page 520 in the guest browserenvironment to perform validation of a requested web page. For example,if a pop-up blocking module 485 detects a markup in an HTML web pagethat contains a metarefresh instruction for opening up a new web page toa known malicious or nuisance web site, the pop-up blocking module 485may ignore the instruction.

As previously mentioned, virtual plug-in modules may be loaded frominstructions on the web page 520 to provide extended functionality, suchas providing support for a new file or data standard, such as standardvector graphics (SVG). For example, this type of module may identify XMLcode directed towards the SVG standard and then translate the code intodrawing stroke commands understood by and passed to the installed webbrowser 420 for presentation.

In one embodiment, the guest browser system 400 employs a technologygenerally referred as AJAX. AJAX and similar technology allows theJavaScript within a web page loaded by a web browser to make a call outand get data to use in a given page without having to transition toanother page.

In one embodiment employing AJAX technology, the installed web browser420 creates the guest browser module 460 utilizing an XMLHTTPREQUESTobject. The XMLHTTPREQUEST object retrieves content from a web server450 instead of utilizing the normal flow, as represented in FIG. 2. Aspreviously referenced in FIG. 3, the virus protection module 480examines the content retrieved by the object before the content ispassed to the presentation engine of the installed web browser 420. Ifthe virus protection software module 480 detects a known virus or otherpotentially malicious code or object, the virus protection module 480may remove the offending object or not allow the content to be presentedfor display. Further, the virus protection module 480 may pass anotification message to be displayed as content by the installed webbrowser 420, as generally shown in FIG. 6.

Other loaded and virtual modules may also interact with contentretrieved by the guest browser module 460. For example, a pop-upblocking module 485 may examine content to determine whether there areany type of objects or codes that may trigger pop-up advertisements andin response, remove such references.

Since the guest browser module 460 is pulling content from the network470, the entire content of the page 520 is not necessarily updated asthe module 460 is updating particular content. However, the retrievedcontent is still subject to virtual plug-ins and modules loaded ondemand and displayed through the context of the guest browser 460 asinstructed by the web page 520 being displayed.

As previously discussed, one beneficial use of the guest browser 460 isthat virtual plug-in modules, such as pop-up blocking modules, virusprotection modules, and toolbar modules, may be loaded on any clientdevice at startup of a web browser with the newest version of theplug-in being fairly assured of being loaded on the client machine. Thispreference information may be maintained on the web server 470 that alsomaintains a web page 520 used to build the guest browser. Further, onany client machine, a user may be assured of having his or her preferredplug-ins or modules to be loaded. In one embodiment, a guest browserinterface 730 may indicate which modules are currently loaded, as shownin FIG. 7 by pointer 740.

Consider that in one sample scenario, a user may approach a kiosk thatis running an installed browser 420 and direct the browser 420 to his orher personal portal page 520 that is configured to act as a guestbrowser 460 and has the appropriate code to launch and build the guestbrowser interface and preferred plug-ins or modules. Therefore, uponloading the portal page 520 on the installed browser 420 of the kiosk,the user has his or her desired browsing environment and also has a highlevel of trust with the unknown browser 420 of the kiosk because it isnow running all of the user's preferred software, although the user didnot have to install any components with the operating system environmentthat the web browser 420 is running in (within the kiosk).

An additional beneficial use of this system is to construct a protectedpoint tunnel in an installed web browser 420 using the guest browserenvironment. For example, within an organizational network, such as acorporate network, users may now be allowed to visit outside mailservices, such as Yahoo® Mail or Hotmail®, since the virus protectionmodule is in place to intercept any malicious mail before it has achance to infect the operating system 495 of the client system and otherclient systems. This may alleviate concerns with contractors within acorporation having to access outside their company e-mail when thecompany of the contractors does not recognize a virtual private network(VPN) utilized by the corporation. Further, in some embodiments,additional functionality offered by the guest browser environment is avirtual and dynamically loaded VPN solution that persists within theinstalled web browser instance, where the algorithm for the VPN solutionis implemented by the web page 520 or site implementing the guestbrowser logic.

In an additional embodiment, virtual proxy server functionality may beemployed by the code implementing the guest browser module. For example,in many corporate environments, installed web browsers 420 of clientmachines are configured to send network requests through a proxy server.In accordance with an embodiment of the present disclosure, this type ofsetting may be established within the guest browser environment. Forexample, a virtual proxy object may be loaded by an installed webbrowser 420 that works in concert with the guest browser 460 to check aweb request against authorized list of web sites or non-authorized listof web sites to determine whether the web request is authorized. If theweb request is not authorized, then the guest browser module 460 doesnot send a request for content from the requested web site.

With this type of administrative control, network security settings donot have to be set at client stations and new software does not have tobe pushed to client desktops. Rather, new management controls may beinitiated on a demand basis without interrupting the workflow of users.Similar functionality may also be offered in a commercial environment.

In an additional context, one embodiment of the guest browser system 400is capable of making secure calls from an insecure web page or viceversa, either in conjunction with a virtual proxy server or a virtualplug-in module. Consider that in one example, a web site may in responseto receiving a username and password provide a cookie which has a keythat is used to maintain communications with the web site. Duringcommunications, the cookie is repeatedly provided back to the web siteas proof of authorization. Further, a virtual plug-in module may beemployed that changes the key every 60 seconds, where the current key isrequired for repeated communication with the web-site.

In an additional embodiment, the guest browser logic may simulateanother web browser platform. For example, as a testing environment, theguest browser module may identify itself (e.g., modify the headerelements sent to the server) as a different browser platform than theinstalled browser platform or identify itself as a platform for anoperating system that is different than the installed operating system,so that browser compatibility may be tested. Accordingly, in oneembodiment, HTML code may be manipulated by the guest browser logicbefore it is provided to the installed web browser 420 for presentation.Further, the guest browser logic may simulate known bugs or overcomenative issues with a “virtual patch.” For example, if it is known that aparticular version of Internet Explorer® does not render a particularobject that has a coding error, the coding error may be fixed on the flyby the guest browser logic. As a result, only properly formatted code isactually passed out to the installed web browser 420 for presentation.

Another common problem in testing is that different browser versions donot operate well with other browser versions that are installed on thesame operating system at the same time. Therefore, different browserversions may be simulated using one guest browser implementation, whichis beneficial and may be referred as a type of virtual canonicalization.

Since not all browsers and not all servers necessarily supportcompression, another beneficial use of one embodiment of the guestbrowser environment is to send a reduced instruction request back andforth between a server 470 and the guest browser module 460. Further, insome embodiments, the compression model utilized by the guest browser isa model not understood by the installed web browser 420 itself.Therefore, as part of an exchange with a web site, the guest browsermodule 460 may identify that it has the feature of supporting acompression algorithm. Accordingly, this feature of making a compressedrequest from an installed browser 420 that does not support compressionmay be utilized without having to install the feature with the operatingsystem 495 or modifying the base browser 420.

Also, in some embodiments, guest browser logic may employ an algorithmthat delays picture and image loads until after style sheets and basictext is downloaded to give an appearance of providing a speed boost byreordering the order at which network content is received and presented.Further, in some embodiments, a network policy (such as a corporatepolicy) may be instituted via guest browser logic that modifies thedownload rate for visits to external sites such that users of the guestbrowser have to comply with a particular download rate set byorganizational network rules.

New and interesting extensions may also be made to HTML code via oneembodiment of the guest browser system of the present disclosure. In oneapplication, e-mail address information may be hidden from view ofinstalled web browsers but be made accessible to guest browsers. Forexample, in one implementation, a markup may be created to identify anencryption language that is used to encrypt e-mail addresses within aweb page. Therefore, Internet robots and spiders that look for e-mailaddresses from Internet content will be unable to recognize e-mailaddresses that are encrypted. However, to a guest browserimplementation, the encrypted e-mail address is recognized, decrypted,and displayed to a user, since the guest browser logic knows how to dothe decryption. As such, the decryption process is performed at displaytime by the guest browser module 460.

Referring now to FIG. 8, a flow chart describing one embodiment of amethod 800 for implementing a guest browser is shown. The method 800starts at block 810 where a guest browser interface is displayed with anaddress bar. The guest browser interface is displayed within aninterface of an installed web browser and is built from code provided bya web page currently being rendered by the installed web browser. Themethod 800 further includes the step of updating (820) content of theweb page being currently rendered with content retrieved by a guestbrowser engine supporting the guest browser interface. The guest browserengine retrieves content corresponding to a requested web page at anetwork address inputted into the address bar by a user. Additionalmodules may also be produced (830) to extend the functionality of theguest browser according to designated preferences obtained from a remotenetwork location. The additional modules may be produced or instantiatedbased upon code provided by the web page being currently rendered by theinstalled web browser.

Referring next to FIG. 9, a flow chart describing another embodiment ofa method 900 for implementing a guest browser is shown. The method 900starts at block 910 where a guest browser application is instantiatedwithin a client device without installing the guest browser applicationwith an operating system of the client device. Further, the guestbrowser application is configured to obtain (920) the contents of arequested web page utilizing XML requests instead of communicationrequests based upon the hypertext transfer protocol (HTTP). Further,different portions of the requested web page may be updated (930)asynchronously from one another.

Advantageously, with AJAX and related technologies, a guest browsermodule 460 is allowed to make server calls outside a normal page refreshcycle, and the data that is returned can be defined in an XML structurethat may be interpreted according to logic of the guest browserenvironment. Generally, the guest browser engine allows a user'sinteraction with guest browser interface to happen asynchronously andindependent of communication with the server. As a result, a user doesnot have to stare at a blank browser window waiting for a response froma web server 450, since a user action that normally would generate anHTTP request takes the form of a JavaScript call to the guest browsermodule 460 instead.

The end result is that a guest browser 460 can have capabilities greaterthan or less than the installed browser 420 it is running in. Further,one is able to submit an asynchronous request from the guest browser 460without the installed web browser 420 having to go back to the server450 for every request to refresh a new page of content. Thus, the guestbrowser 460 can make asynchronous calls to a network server and acquiredata and the page without doing a page refresh.

Further, consider that one of the complaints with general browserfunctionality is that a user has to wait for a whole web page to bepainted or rendered by the web browser. However, with an embodiment ofthe guest browser environment, the guest browser environment may beconstructed so that there is more of a persistent type of functionalityon the desktop, yet particular components of a web page may be protectedand may pull data back from other network systems without having torefresh all the content of the whole page each time.

When the guest browser module 460 and other modules/components areimplemented in software, as is shown in FIG. 4, it should be noted thatthe guest browser module 460 can be stored on any computer readablemedium for use by or in connection with any computer related system ormethod. In the context of this document, a computer readable medium isan electronic, magnetic, optical, or other physical device or means thatcan contain or store a computer program for use by or in connection witha computer related system or method.

The guest browser module 460 can be embodied in any computer-readablemedium for use by or in connection with an instruction execution system,apparatus, or device, such as a computer-based system,processor-containing system, or other system that can fetch theinstructions from the instruction execution system, apparatus, or deviceand execute the instructions. In the context of this document, a“computer-readable medium” can be any means that can store, communicate,propagate, or transport the program for use by or in connection with theinstruction execution system, apparatus, or device. The computerreadable medium can be, for example but not limited to, an electronic,magnetic, optical, electromagnetic, infrared, or semiconductor system,apparatus, device, or propagation medium. More specific examples (anonexhaustive list) of the computer-readable medium would include thefollowing: an electrical connection (electronic) having one or morewires, a portable computer diskette (magnetic), a random access memory(RAM) (electronic), a read-only memory (ROM) (electronic), an erasableprogrammable read-only memory (EPROM, EEPROM, or Flash memory)(electronic), an optical fiber (optical), and a portable compact discread-only memory (CDROM) (optical). Note that the computer-readablemedium could even be paper or another suitable medium upon which theprogram is printed, as the program can be electronically captured, viafor instance optical scanning of the paper or other medium, thencompiled, interpreted or otherwise processed in a suitable manner ifnecessary, and then stored in a computer memory.

Any process descriptions or blocks in flow charts should be understoodas representing modules, segments, or portions of code which include oneor more executable instructions for implementing specific logicalfunctions or steps in the process, and alternate implementations areincluded within the scope of the present disclosure in which functionsmay be executed out of order from that shown or discussed, includingsubstantially concurrently or in reverse order, depending on thefunctionality involved, as would be understood by those reasonablyskilled in the art of the present disclosure.

It should be emphasized that the above-described embodiments of thepresent disclosure are merely possible examples of implementations,merely set forth for a clear understanding of the principles of thedisclosure. Many variations and modifications may be made to theabove-described embodiment(s) without departing substantially from thespirit and principles of the disclosure. For example, one embodiment ofa guest browser system provides a virus protection module that feedsdata received from the Internet to a centralized and externalized virusprotection system that inspects the data before authorizing itspresentation on a client system. All such modifications and variationsare intended to be included herein within the scope of this disclosure.

What is claimed is:
 1. A system comprising: a web browser; a processor;and a memory storing instructions that, when executed by the processor,cause the processor to perform operations comprising: displaying, viathe web browser, a graphical interface comprising a first address barinterface and a first display section, receiving, via the first addressbar interface, a request for a first web page maintained at a server,the first web page comprising code to cause the web browser to render aguest browser interface, wherein the code comprises a tag specifyingparameters for the guest browser interface and wherein the parametersfor the guest browser interface comprise an alignment and dimensions ofa display window within which the guest browser interface is to operate,and further code associated with a virtual module, in response toreceiving the request for the first web page, requesting, from theserver, the first web page, and in response to receiving the first webpage from the server, rendering, via the first display section of theweb browser, the guest browser interface, the guest browser interfacecomprising a second address bar and a second display section, whereinthe web browser obtains content of requested web pages based onhypertext transfer protocol and the guest browser interface obtains thecontent of the requested web pages utilizing extensible markup language,and instantiating the virtual module to extend functionality of theguest browser interface according to designated preferences obtainedfrom a remote network location, wherein the functionality of the guestbrowser interface surpasses a functionality of the web browser withoutinstalling components associated with the virtual module with aninstalled operating system of the system.
 2. The system of claim 1,wherein the virtual module comprises a virus protection module foranalyzing the content of the requested web pages.
 3. The system of claim1, wherein the virtual module comprises a pop-up blocking module foranalyzing the content of the requested web pages for instructions toopen at least one window interface.
 4. The system of claim 1, whereinthe virtual module comprises a data compression module for supporting adata compression algorithm on communications accepted by a guest webbrowser engine associated with the guest browser interface.
 5. Thesystem of claim 1, wherein the virtual module comprises a testing modulefor simulating operation of a web browser platform other than the webbrowser.
 6. The system of claim 1, wherein the virtual module comprisesa testing module for simulating operation of a web browser platform foran operating system different than the installed operating system of thesystem.
 7. The system of claim 1, wherein the operations furthercomprise maintaining, by a guest web browser engine associated with theguest browser interface, a cache of web sites retrieved by the guest webbrowser engine.
 8. A method comprising: displaying, via a web browser ofa client device comprising a processor, a graphical interface comprisinga first address bar interface and a first display section; receiving, atthe processor via the first address bar interface, a request for a firstweb page maintained at a server, the first web page comprising code tocause the web browser to render a guest browser interface, wherein thecode comprises a tag specifying parameters for the guest browserinterface and wherein the parameters for the guest browser interfacecomprise an alignment and dimensions of a display window within whichthe guest browser interface is to operate, and further code associatedwith a virtual module; in response to receiving the request for thefirst web page, requesting, by the processor from the server, the firstweb page; and in response to receiving the first web page from theserver, rendering, by the processor via the first display section of theweb browser, the guest browser interface, the guest browser interfacecomprising a second address bar and a second display section, whereinthe web browser obtains content of requested web pages based onhypertext transfer protocol and the guest browser interface obtains thecontent of the requested web pages utilizing extensible markup language,and instantiating, by the processor, the virtual module to extendfunctionality of the guest browser interface according to designatedpreferences obtained from a remote network location, wherein thefunctionality of the guest browser interface surpasses a functionalityof the web browser without installing components associated with thevirtual module with an installed operating system of the client device.9. The method of claim 8, wherein the virtual module comprises a pop-upblocking module for preventing pop-up windows.
 10. The method of claim8, wherein the virtual module comprises a virus protection module foranalyzing the content of the requested web pages.
 11. The method ofclaim 8, wherein the virtual module comprises a data compression modulefor supporting a data compression algorithm on communications acceptedby a guest web browser engine associated with the guest browserinterface.
 12. The method of claim 8, wherein the virtual modulecomprises a testing module for simulating operation of a web browserplatform other than the web browser.
 13. The method of claim 8, whereinthe virtual module comprises a testing module for simulating operationof a web browser platform for an operating system different than theinstalled operating system of the client device.
 14. The method of claim8, further comprising maintaining, by a guest web browser engineassociated with the guest browser interface, a cache of web sitesretrieved by the guest web browser engine.
 15. A non-transitory computerreadable storage medium storing instructions that, when executed by aclient device comprising a web browser and a processor, cause theprocessor to perform operations comprising: displaying, via the webbrowser, a graphical interface comprising a first address bar interfaceand a first display section; receiving, via the first address barinterface, a request for a first web page maintained at a server, thefirst web page comprising code to cause the web browser to render aguest browser interface, wherein the code comprises a tag specifyingparameters for the guest browser interface and wherein the parametersfor the guest browser interface comprise an alignment and dimensions ofa display window within which the guest browser interface is to operate,and further code associated with a virtual module; in response toreceiving the request for the first web page, requesting, from theserver, the first web page; and in response to receiving the first webpage from the server, rendering, via the first display section of theweb browser, the guest browser interface, the guest browser interfacecomprising a second address bar and a second display section, whereinthe web browser obtains content of requested web pages based onhypertext transfer protocol and the guest browser interface obtains thecontent of the requested web pages utilizing extensible markup language,and instantiating the virtual module to extend functionality of theguest browser interface according to designated preferences obtainedfrom a remote network location, wherein the functionality of the guestbrowser interface surpasses a functionality of the web browser withoutinstalling components associated with the virtual module with aninstalled operating system of the client device.
 16. The non-transitorycomputer readable storage medium of claim 15, wherein the virtual modulecomprises a virus protection module for analyzing the content retrievedby a guest web browser engine associated with the guest browserinterface.
 17. The non-transitory computer readable storage medium ofclaim 15, wherein the virtual module comprises a testing module forsimulating operation of a web browser platform other than the webbrowser.
 18. The non-transitory computer readable storage medium ofclaim 15, wherein the virtual module comprises a pop-up blocking modulefor preventing pop-up windows.
 19. The non-transitory computer readablestorage medium of claim 15, wherein the virtual module comprises a datacompression module for supporting a data compression algorithm oncommunications accepted by a guest web browser engine associated withthe guest browser interface.
 20. The non-transitory computer readablestorage medium of claim 15, wherein the virtual module comprises atesting module for simulating operation of a web browser platform for anoperating system different than the installed operating system of theclient device.