Content handling for applications
First Claim
Patent Images
1. A system comprising:
- one or more processors; and
one or more computer-readable storage devices storing instructions, comprising at least an application manager module and a content inspection module, that are executable by the one or more processors to;
receive an indication that a portion of an application is requesting to pass content to a code element of a computing device, the application including a first compartment and a second compartment that include different respective portions of application code that enable different respective functionality to be invoked by the respective compartments of the application;
execute the content inspection module to ascertain, based at least on an identifier for the portion of the application, whether the portion of the application is part of the first compartment of the application that is permitted to access a sensitive functionality of the computing device, or part of the second compartment of the application that lacks permission to access the sensitive functionality, the first compartment having a first set of content handling policies and the second compartment having a second set of content handling policies, wherein the identifier comprises a uniform resource identifier (URI) providing a designation of the first compartment being related to a locally stored compartment or the second compartment being a remotely stored compartment in a manner specifying whether the application is permitted to access the sensitive functionality of the computing device; and
execute the application manager module to apply one of the first set of content handling policies or the second set of content handling policies to the request to;
(1) determine whether the application indicates that the untrusted content is to be sanitized before it is passed to the code element and (2) pass the content to the code element based on whether the portion of the application that is requesting to pass the content is part of the first compartment or the second compartment of the application, wherein the portion of the application being allowed or disallowed to pass the content to the code element subject to one of the first set of content handling policies or the second set of content handling policies.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques for content handling for applications are described. In one or more implementations, a first set of content handling policies is enforced for a first portion of an application that is permitted to invoke code elements of the computing device and a second set of content handling policies is enforced for a second portion of the application that is not permitted to invoke the code elements. Further, a determination is made whether to apply the first set of content handling policies or the second set of content handling policies to content based on which portion of the application is requesting the content.
-
Citations
20 Claims
-
1. A system comprising:
-
one or more processors; and one or more computer-readable storage devices storing instructions, comprising at least an application manager module and a content inspection module, that are executable by the one or more processors to; receive an indication that a portion of an application is requesting to pass content to a code element of a computing device, the application including a first compartment and a second compartment that include different respective portions of application code that enable different respective functionality to be invoked by the respective compartments of the application; execute the content inspection module to ascertain, based at least on an identifier for the portion of the application, whether the portion of the application is part of the first compartment of the application that is permitted to access a sensitive functionality of the computing device, or part of the second compartment of the application that lacks permission to access the sensitive functionality, the first compartment having a first set of content handling policies and the second compartment having a second set of content handling policies, wherein the identifier comprises a uniform resource identifier (URI) providing a designation of the first compartment being related to a locally stored compartment or the second compartment being a remotely stored compartment in a manner specifying whether the application is permitted to access the sensitive functionality of the computing device; and execute the application manager module to apply one of the first set of content handling policies or the second set of content handling policies to the request to;
(1) determine whether the application indicates that the untrusted content is to be sanitized before it is passed to the code element and (2) pass the content to the code element based on whether the portion of the application that is requesting to pass the content is part of the first compartment or the second compartment of the application, wherein the portion of the application being allowed or disallowed to pass the content to the code element subject to one of the first set of content handling policies or the second set of content handling policies. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
detecting that a portion of an application executing on a computing device is requesting to pass content to a code element of the computing device, wherein the computing device comprises an application manager module and a content inspection module; ascertaining, by the content inspection modules of the computing device, and based at least on an identifier for the portion of the application, whether the portion of the application is part of a first compartment of the application that is permitted to access a sensitive functionality of the computing device, or part of a second compartment of the application that lacks permission to access the sensitive functionality, the first compartment and the second compartment including different respective portions of application code that enable different respective functionality to be invoked by the respective compartments of the application, wherein the identifier comprises a uniform resource identifier (URI) that references the first compartment being related to a locally stored compartment or the second compartment being related to a remotely stored compartment in a manner specifying whether the application is permitted to access the sensitive functionality of the computing device; and responsive to the ascertaining, determining, by the application manager module of the computing device, whether the application indicates that the untrusted content is to be sanitized before it is passed to the code element and whether to allow or disallow the request based on whether the portion of the application is part of the first compartment or the second compartment. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A method, comprising:
-
determining that a portion of an application is requesting that content be passed to a code element of a computing device, wherein the computing device comprises an application manager module and a content inspection module; determining, at the content inspection modules of the computing device, and based on at least an identifier for the portion of the application, whether the portion of the application is a first portion of the application that is permitted to invoke the code element or a second portion of the application that lacks permission to invoke the code element, the first portion and the second portion of the application identifying different respective sets of code elements that enable different respective functionality to be invoked by the respective portions of the application, wherein the identifier comprises a uniform resource identifier (URI) that references the first compartment being related to a locally stored compartment or the second compartment being related to a remotely stored compartment in a manner specifying whether the application is permitted to access the sensitive functionality of the computing device; determining, by the application manager module of the computing device, that the portion of the application is the first portion of the application that is permitted to invoke the code element; and ascertaining, by the computing device, whether the application indicates that the untrusted content is to be sanitized before it is passed to the code element and whether the content is permitted to be passed to the code element based on at least one of a source of the content or a content type for the content. - View Dependent Claims (17, 18, 19, 20)
-
Specification