-
公开(公告)号:US20230083977A1
公开(公告)日:2023-03-16
申请号:US17939254
申请日:2022-09-07
Applicant: Worcester Polytechnic Institute
Inventor: Craig Shue , Julian Lanson , Lane Harrison , Yunsen Lei , Matthew Puentes
Abstract: Embodiments of the innovation relate to, in a webserver device, a method for identifying a logic defect in an application. The method comprises establishing a webserver instance of the webserver device with a client device, the webserver instance of the webserver device having a corresponding set of client device permissions; receiving a content request from the client device associated with the webserver instance of the webserver device; detecting a violation of a permission of the set of client device permissions associated with the webserver instance of the webserver device; identifying at least one webserver function associated with the violation of the permission of the set of client device permissions; and displaying a visual identification of the at least one webserver function associated with the violation of the permission of the set of client device permissions.
-
公开(公告)号:US20230086957A1
公开(公告)日:2023-03-23
申请号:US17946595
申请日:2022-09-16
Applicant: Worcester Polytechnic Institute
Inventor: Craig Shue , Lane Harrison
Abstract: Embodiments of the innovation relate to a server device, comprising a controller having a memory and a processor, the controller configured to establish a first secure environment with a client device, the first secure environment having an associated server asset policy; provide the asset to the client device via the first secure environment; receive a request from the client device, via the first secure environment, to utilize the asset with a user-selected application according to a user-selected asset policy; establish a second secure environment with the client device, the second secure environment having the user-selected application and the associated user-selected asset policy and the second secure environment isolated from the first secure environment; and provide the asset to the client device via the second secure environment.
-