Methods and systems for implementing a secure application execution environment using derived user accounts for internet content
First Claim
Patent Images
1. A method for providing secure content use comprising:
- receiving content from a resource;
determining if the received content is trusted or untrusted content; and
taking a first action with respect to the received content, if the content is untrusted, or taking a second action with respect to the received content, if the content is trusted.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are disclosed for implementing a secure application execution environment using Derived User Accounts (SAE DUA) for Internet content. Content is received and a determination is made if the received content is trusted or untrusted content.
The content is accessed in a protected derived user account (DUA) such as a SAE DUA if the content is untrusted otherwise the content is accessed in a regular DUA if the content is trusted.
-
Citations
15 Claims
-
1. A method for providing secure content use comprising:
-
receiving content from a resource;
determining if the received content is trusted or untrusted content; and
taking a first action with respect to the received content, if the content is untrusted, or taking a second action with respect to the received content, if the content is trusted. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computing system for providing secure content comprising:
-
at least one memory hosting a protected derived user account (DUA) and a regular DUA; and
a processor configured to receive content from a resource, determine if the received content is trusted or untrusted content, and take a first action with respect to the received content, if the content is untrusted, or take a second action with respect to the received content, if the content is trusted. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer-readable medium containing instructions for controlling a computing system having a processor, to perform a method comprising:
-
receiving content from a resource;
determining if the received content is trusted or untrusted content; and
taking a first action with respect to the received content, if the content is untrusted, or taking a second action with respect to the received content, if the content is trusted. - View Dependent Claims (12, 13, 14, 15)
-
Specification