×

Sandboxing third party components

  • US 9,959,405 B2
  • Filed: 09/11/2014
  • Issued: 05/01/2018
  • Est. Priority Date: 05/28/2014
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory machine-readable medium having executable instructions to cause one or more processing units to perform a method of security management for a data processing system, the method comprising:

  • determining whether a third-party component supports access to a network coupled to the data processing system, wherein the third-party component provides input data to a user application;

    when the third-party component supports network access, requesting an input regarding whether to restrict access of system resources by the third-party component;

    constructing a restrictive access sandbox for the third-party component in response to receiving an input indicating to restrict access to the network by the third-party component, wherein the third-party component, executing within the restrictive access sandbox, sends to the user application, text based on character input to the third-party component, and stores text prediction information received from the user application in the restrictive access sandbox for subsequent access by the third-party component to predict text for input characters, the restrictive access sandbox further storing text predication information generated by the third-party component; and

    constructing a normal access sandbox for the third-party component in response to receiving an input indicating not to restrict access of system resources by the third-party component.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×