PROCESSING OF CONTENT FOR APPLICATIONS Russian patent published in 2017 - IPC G06F21/62 G06F21/56 

Abstract RU 2626658 C2

FIELD: information technology.

SUBSTANCE: computer system is proposed, wherein the indication that an application portion requests for a content transmission to the computing device code element is received, the application includes the first section and the second section; based on application portion identifier, it is identificated whether this part is a part of the first section with allowed access to the critical functionality of a computing device, or a part of the second section without allowed access to this functionality, wherein the first and the second sections have the first and the second sets of content processing policies, respectively; one of the first or the second sets of content processing policies is applied to the said request based on whether a part of an application or part of the first section or a part of the second section, wherein this part is allowed or not allowed to transmit content to the code element in accordance with one of the first or the second sets of content processing policies.

EFFECT: reduced probability of malicious code access to sensitive parts of computing device.

20 cl, 6 dwg

Similar patents RU2626658C2

Title Year Author Number
HARDWARE VIRTUALIZED ISOLATION FOR ENSURING SECURITY 2017
  • Pai, Navin Narayan
  • Jeffries, Charles G.
  • Viswanathan, Giridhar
  • Schultz, Benjamin M.
  • Smith, Frederick J.
  • Reuther, Lars
  • Ebersol, Michael B.
  • Diaz Cuellar, Gerardo
  • Pashov, Ivan Dimitrov
  • Gaddehosur, Poornananda R.
  • Pulapaka, Hari R.
  • Rao, Vikram Mangalore
RU2755880C2
WORLD-DRIVEN ACCESS CONTROL 2014
  • Kokhno Tadaesi
  • Molnar Devid A.
  • Moshchuk Aleksander N.
  • Resner Frantsiska
  • Van Tszyakhe Khelen
RU2679983C2
PRESENTING OPERATING SYSTEM CONTEXT IN TRUSTED PLATFORM MODULE 2015
  • Tom Stefan
  • Ajgner Ronald
  • Pai Navin
RU2702276C2
DATA ACCESS CONTROL SYSTEM AND METHOD 2021
  • Vereshchagin Aleksei Georgievich
  • Kashitsyn Denis Sergeevich
  • Dontsov Maksim Andreevich
  • Morozov Ruslan Iurevich
  • Lukiian Dmitrii Sergeevich
RU2790338C1
CONFIGURATION OF ISOLATED EXTENSIONS AND DEVICE DRIVERS 2006
  • Khant Galen K.
  • Larus Dzhejms R.
  • Fandrich Manuehl A.
  • Khodson Orion
  • Levi Stiven P.
  • Stensgor B'Jarne
  • Tarditi Dehvid R.
  • Spear Majkl
  • Karbin Majkl
  • Abadi Martin
  • Ajken Mark
  • Barkhehm Pol
  • Uobber Tehd
  • Zill Brajan
  • Khoblittsel Kris
  • Merfi Nik
RU2443012C2
NETWORK GATEWAY AND METHOD FOR TRANSFERRING DATA FROM A FIRST NETWORK TO A SECOND NETWORK 2021
  • Vereshchagin Aleksei Georgievich
  • Kashitsyn Denis Sergeevich
  • Dontsov Maksim Andreevich
  • Morozov Ruslan Iurevich
  • Lukiian Dmitrii Sergeevich
RU2770458C1
SYSTEM AND METHOD OF OPENING FILES CREATED BY VULNERABLE APPLICATIONS 2015
  • Efremov Andrej Anatolevich
  • Ladikov Andrej Vladimirovich
  • Solodovnikov Andrej Yurevich
  • Monastyrskij Aleksej Vladimirovich
RU2606883C2
METHOD OF PROVIDING SAFE EXECUTION OF SCRIPT FILE 2014
  • Ladikov Andrej Vladimirovich
  • Solodovnikov Andrej Jurevich
RU2584507C1
RANSOMWARE MITIGATION IN INTEGRATED ISOLATED APPLICATIONS 2020
  • Schwartz, Jonathan David
  • Tarnouskaya, Anastasiya
RU2807463C2
VIRTUAL MACHINE MANAGER FACILITATED SELECTIVE CODE INTEGRITY ENFORCEMENT 2014
  • Khepkin Devid A.
  • Dzhonson Kennet D.
RU2667713C2

RU 2 626 658 C2

Authors

Risni Devid L. Ml.

Grekhem Skott B.

Zhurden Matias

Iskin Sermet

Ross Devid Endryu

Dates

2017-07-31Published

2012-09-04Filed