Content Inspection
    2.
    发明申请
    Content Inspection 有权
    内容检查

    公开(公告)号:US20130067570A1

    公开(公告)日:2013-03-14

    申请号:US13228338

    申请日:2011-09-08

    IPC分类号: G06F21/24

    摘要: Content inspection techniques are described. In one or more implementations, it is detected that an application executing on a computing device is calling a particular code element of a group of code elements to be used to process content. For example, the group of code elements can include a pre-specified group of code elements (e.g., functions and/or properties) that may enable access to particular functionalities of a computing device and thus are associated with a known security risk. It is then ascertained that the content is untrusted and, in response to ascertaining that the content is untrusted, the content is inspected to determine if the content is safe to be passed to the code element.

    摘要翻译: 描述内容检查技术。 在一个或多个实现中,检测到在计算设备上执行的应用正在调用要用于处理内容的一组代码元素的特定代码元素。 例如,代码元素组可以包括预先指定的代码元素组(例如,功能和/或属性),其可以使得能够访问计算设备的特定功能,并且因此与已知的安全风险相关联。 然后确定内容是不受信任的,并且响应于确定内容不受信任,检查内容以确定内容是否安全地被传递给代码元素。

    Capability Access Management for Processes
    3.
    发明申请
    Capability Access Management for Processes 审中-公开
    流程的能力访问管理

    公开(公告)号:US20130061316A1

    公开(公告)日:2013-03-07

    申请号:US13225945

    申请日:2011-09-06

    IPC分类号: G06F21/00

    摘要: Capability access management techniques for processes are described. In one or more implementations, a token is formed having one or more security identifiers that reference capabilities described in a manifest for the executable code responsive to an input received to initiate execution of executable code installed on the computing device. The one or more processes formed through execution of the executable code on the computing device are associated with the token, the token usable to manage access of the one or more processes to the capabilities of the computing device.

    摘要翻译: 描述进程的能力访问管理技术。 在一个或多个实现中,形成具有一个或多个安全标识符的令牌,所述安全标识符响应于接收到的输入来引用可执行代码的清单中描述的能力,以启动安装在计算设备上的可执行代码的执行。 通过在计算设备上执行可执行代码形成的一个或多个过程与令牌相关联,令牌可用于管理一个或多个进程对计算设备的能力的访问。

    Content inspection
    4.
    发明授权
    Content inspection 有权
    内容检查

    公开(公告)号:US09223976B2

    公开(公告)日:2015-12-29

    申请号:US13228338

    申请日:2011-09-08

    摘要: Content inspection techniques are described. In one or more implementations, it is detected that an application executing on a computing device is calling a particular code element of a group of code elements to be used to process content. For example, the group of code elements can include a pre-specified group of code elements (e.g., functions and/or properties) that may enable access to particular functionalities of a computing device and thus are associated with a known security risk. It is then ascertained that the content is untrusted and, in response to ascertaining that the content is untrusted, the content is inspected to determine if the content is safe to be passed to the code element.

    摘要翻译: 描述内容检查技术。 在一个或多个实现中,检测到在计算设备上执行的应用正在调用要用于处理内容的一组代码元素的特定代码元素。 例如,代码元素组可以包括预先指定的代码元素组(例如,功能和/或属性),其可以使得能够访问计算设备的特定功能,并且因此与已知的安全风险相关联。 然后确定内容是不受信任的,并且响应于确定内容不受信任,检查内容以确定内容是否安全地被传递给代码元素。

    Separate script context to isolate malicious script
    5.
    发明授权
    Separate script context to isolate malicious script 有权
    分离脚本上下文以隔离恶意脚本

    公开(公告)号:US08505070B2

    公开(公告)日:2013-08-06

    申请号:US13228346

    申请日:2011-09-08

    IPC分类号: G06F7/04 G06F11/30 H04L9/32

    CPC分类号: G06F21/53

    摘要: Various embodiments provide an ability to isolate execution of trusted content and/or script from execution of untrusted content and/or script. Separate contexts and/or execution environments can be used for the trusted content and untrusted content, respectively. A trusted context and/or execution environment associated with execution of trusted content can be configured to enable access to sensitive resources associated with a computing device. An untrusted context and/or execution environment associated with execution of untrusted content can be configured with limited and/or no access to the sensitive resources. Alternately or additionally, data generated within the untrusted context can be transferred to the trusted context in a benign manner.

    摘要翻译: 各种实施例提供将可信内容和/或脚本的执行隔离为不受信任的内容和/或脚本的执行的能力。 单独的上下文和/或执行环境可以分别用于可信内容和不可信内容。 与可信内容的执行相关联的可信赖的上下文和/或执行环境可以被配置为使得能够访问与计算设备相关联的敏感资源。 与执行不受信任的内容相关联的不可信上下文和/或执行环境可以被配置为对敏感资源的有限和/或不访问。 或者或另外地,在不可信上下文内生成的数据可以以良性的方式传送到可信上下文。