首页> 外国专利> Strategies for controlling use of a resource that is shared between trusted and untrusted environments

Strategies for controlling use of a resource that is shared between trusted and untrusted environments

机译:控制在受信任和不受信任环境之间共享的资源使用的策略

摘要

A strategy is described for controlling access to a resource which is shared between a trusted environment and an untrusted environment. The resource can represent a clipboard module. The trusted environment can include trusted client functionality, while the untrusted environment can include potentially untrusted network-accessible entities (e.g., websites) which seek to access the clipboard module. The strategy provides a security presentation which notifies a user when a network-accessible entity is attempting to access the clipboard module, identifying the entity which is making the attempt, together with the nature of the information being read or added to the clipboard module. The security presentation invites the user to approve or deny the particular attempt (or all such attempts from the network-accessible entity), and/or clear the clipboard module. The security presentation does not block the user's interaction with other parts of a user interface presentation.
机译:描述了一种策略,该策略用于控制对在可信环境和不可信环境之间共享的资源的访问。该资源可以表示剪贴板模块。受信任的环境可以包括受信任的客户端功能,而不受信任的环境可以包括试图访问剪贴板模块的潜在不受信任的网络可访问实体(例如,网站)。该策略提供了一个安全演示,当网络可访问的实体尝试访问剪贴板模块时,该安全通知将通知用户,标识正在进行尝试的实体,以及正在读取或添加到剪贴板模块的信息的性质。安全演示文稿邀请用户批准或拒绝特定尝试(或来自网络可访问实体的所有此类尝试),和/或清除剪贴板模块。安全演示文稿不会阻止用户与用户界面演示文稿的其他部分的交互。

著录项

  • 公开/公告号US9178887B2

    专利类型

  • 公开/公告日2015-11-03

    原文格式PDF

  • 申请/专利权人 MICROSOFT CORPORATION;

    申请/专利号US201313887953

  • 发明设计人 SUNAVA DUTTA;ZHENBIN XU;

    申请日2013-05-06

  • 分类号H04L29/06;G06F21/55;G06F21/62;

  • 国家 US

  • 入库时间 2022-08-21 15:19:47

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号