Isolation and presentation of untrusted data
Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a "protected view") by the user without incurring risk to other client processing and systems....
Gespeichert in:
Hauptverfasser: | , , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Pollock, Joshua Campbell, James Jump, Daniel B Carver, Brian LeBlanc, David C Ross, Benjamen E Malhotra, Vikas Canning, Benjamin E |
description | Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a "protected view") by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US10515208B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US10515208B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US10515208B23</originalsourceid><addsrcrecordid>eNrjZNDxLM7PSSzJzM9TSMxLUSgoSi1OzSuBCOSnKZTmlRSVFpekpiikJJYk8jCwpiXmFKfyQmluBkU31xBnD93Ugvz41OKCxOTUvNSS-NBgQwNTQ1MjAwsnI2Ni1AAAuaEqMQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Isolation and presentation of untrusted data</title><source>esp@cenet</source><creator>Pollock, Joshua ; Campbell, James ; Jump, Daniel B ; Carver, Brian ; LeBlanc, David C ; Ross, Benjamen E ; Malhotra, Vikas ; Canning, Benjamin E</creator><creatorcontrib>Pollock, Joshua ; Campbell, James ; Jump, Daniel B ; Carver, Brian ; LeBlanc, David C ; Ross, Benjamen E ; Malhotra, Vikas ; Canning, Benjamin E</creatorcontrib><description>Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a "protected view") by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2019</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20191224&DB=EPODOC&CC=US&NR=10515208B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20191224&DB=EPODOC&CC=US&NR=10515208B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Pollock, Joshua</creatorcontrib><creatorcontrib>Campbell, James</creatorcontrib><creatorcontrib>Jump, Daniel B</creatorcontrib><creatorcontrib>Carver, Brian</creatorcontrib><creatorcontrib>LeBlanc, David C</creatorcontrib><creatorcontrib>Ross, Benjamen E</creatorcontrib><creatorcontrib>Malhotra, Vikas</creatorcontrib><creatorcontrib>Canning, Benjamin E</creatorcontrib><title>Isolation and presentation of untrusted data</title><description>Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a "protected view") by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2019</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZNDxLM7PSSzJzM9TSMxLUSgoSi1OzSuBCOSnKZTmlRSVFpekpiikJJYk8jCwpiXmFKfyQmluBkU31xBnD93Ugvz41OKCxOTUvNSS-NBgQwNTQ1MjAwsnI2Ni1AAAuaEqMQ</recordid><startdate>20191224</startdate><enddate>20191224</enddate><creator>Pollock, Joshua</creator><creator>Campbell, James</creator><creator>Jump, Daniel B</creator><creator>Carver, Brian</creator><creator>LeBlanc, David C</creator><creator>Ross, Benjamen E</creator><creator>Malhotra, Vikas</creator><creator>Canning, Benjamin E</creator><scope>EVB</scope></search><sort><creationdate>20191224</creationdate><title>Isolation and presentation of untrusted data</title><author>Pollock, Joshua ; Campbell, James ; Jump, Daniel B ; Carver, Brian ; LeBlanc, David C ; Ross, Benjamen E ; Malhotra, Vikas ; Canning, Benjamin E</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US10515208B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2019</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Pollock, Joshua</creatorcontrib><creatorcontrib>Campbell, James</creatorcontrib><creatorcontrib>Jump, Daniel B</creatorcontrib><creatorcontrib>Carver, Brian</creatorcontrib><creatorcontrib>LeBlanc, David C</creatorcontrib><creatorcontrib>Ross, Benjamen E</creatorcontrib><creatorcontrib>Malhotra, Vikas</creatorcontrib><creatorcontrib>Canning, Benjamin E</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Pollock, Joshua</au><au>Campbell, James</au><au>Jump, Daniel B</au><au>Carver, Brian</au><au>LeBlanc, David C</au><au>Ross, Benjamen E</au><au>Malhotra, Vikas</au><au>Canning, Benjamin E</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Isolation and presentation of untrusted data</title><date>2019-12-24</date><risdate>2019</risdate><abstract>Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a "protected view") by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US10515208B2 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Isolation and presentation of untrusted data |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-03T02%3A45%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Pollock,%20Joshua&rft.date=2019-12-24&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS10515208B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |