Networking capability according to process
A technology of network capabilities and capabilities, applied in the direction of instruments, calculations, electrical digital data processing, etc., can solve problems such as aggravation and attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0016] overview
[0017] Traditionally, applications executing on computing devices have been allowed access to most, if not all, functionality of the computing device, even whether such access is desired or not. This can include unfettered access to the network. However, in some instances, these same applications may be exploited by malicious parties. These malicious parties can thus use unfettered access to access resources on the Internet, receive unauthorized connections, access networking functions, and more. Accordingly, the broad access given to these applications may now present a significant risk to the user's computing device and the devices to which the computing device has access.
[0018] Describes cyber capability technologies by process. In one or more implementations, a capability model is used to ensure that applications can access developer-defined network resources, but not other network resources that the developer has not defined. Thus, the capability...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 