Unlock instant, AI-driven research and patent intelligence for your innovation.

Networking capability according to process

A technology of network capabilities and capabilities, applied in the direction of instruments, calculations, electrical digital data processing, etc., can solve problems such as aggravation and attacks

Active Publication Date: 2013-01-16
MICROSOFT TECH LICENSING LLC
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This difficulty can be further exacerbated by a malicious party who can attack an application to access functionality supported by the application, such as accessing sensitive data even for the application originating from a trusted source

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Networking capability according to process
  • Networking capability according to process
  • Networking capability according to process

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] overview

[0017] Traditionally, applications executing on computing devices have been allowed access to most, if not all, functionality of the computing device, even whether such access is desired or not. This can include unfettered access to the network. However, in some instances, these same applications may be exploited by malicious parties. These malicious parties can thus use unfettered access to access resources on the Internet, receive unauthorized connections, access networking functions, and more. Accordingly, the broad access given to these applications may now present a significant risk to the user's computing device and the devices to which the computing device has access.

[0018] Describes cyber capability technologies by process. In one or more implementations, a capability model is used to ensure that applications can access developer-defined network resources, but not other network resources that the developer has not defined. Thus, the capability...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention describes a networking capability technology according to process. In one or more embodiments, based on a mark correlated with a process executed on a computer device, the process is determined whether to be allowed to access the network capability. The mark possesses one or more safety identifiers, which cite the one or more network capability described in a list. Based on the determination, the access to the network capability is managed.

Description

Background technique [0001] The ways in which users can obtain executable code (eg, software) for execution by computing devices continue to increase. For example, users have traditionally ventured to "brick and mortar" stores to locate and purchase applications, which are then manually installed by the user. Therefore, users can usually trust the software due to the store's own reputation as well as that of the software developer. [0002] However, with the advent of application marketplaces, users can obtain thousands of applications of different types from hundreds or even thousands of different developers. Thus, a user may install numerous applications on a computing device from a wide variety of sources, some of which may even cause one application to compromise another. Therefore, it is difficult for the user or even the store itself to determine whether these applications are trustworthy, and thus should be allowed to access the functionality of the user's computing d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L67/34G06F15/16H04L63/20G06F21/335G06F21/00H04L63/102G06F2221/2141G06F2221/2145G06F2221/2121G06F21/51G06F21/52
Inventor G.迪亚斯-克拉S.伊斯金J.P.C.科罗内尔门多扎S.B.格雷厄姆N.D.伍德
Owner MICROSOFT TECH LICENSING LLC