摘要 |
<p><P>PROBLEM TO BE SOLVED: To adequately protect client operating environment against untrusted content, such as computer code or other data downloaded from websites, electronic mail messages and any attachments thereto, and scripts or client processes run on a server. <P>SOLUTION: A restricted process is set up for the untrusted content, and any actions attempted by the content are subject to the restrictions of the process, which may be based on various criteria. Whenever a process attempts to access a resource, a token associated with the process is compared against security information of the resource to determine whether the type of access is allowed. The security information of each resource thus determines the extent to which the restricted process, and thus the untrusted content has access. <P>COPYRIGHT: (C)2010,JPO&INPIT</p> |