18478692. DIFFERENTIATED CONTAINERIZATION AND EXECUTION OF WEB CONTENT BASED ON TRUST LEVEL AND OTHER ATTRIBUTES simplified abstract (Intel Corporation)

From WikiPatents
Jump to navigation Jump to search

DIFFERENTIATED CONTAINERIZATION AND EXECUTION OF WEB CONTENT BASED ON TRUST LEVEL AND OTHER ATTRIBUTES

Organization Name

Intel Corporation

Inventor(s)

Hong C. Li of El Dorado Hills CA (US)

John B. Vicente of Roseville CA (US)

Prashant Dewan of Hillsboro OR (US)

DIFFERENTIATED CONTAINERIZATION AND EXECUTION OF WEB CONTENT BASED ON TRUST LEVEL AND OTHER ATTRIBUTES - A simplified explanation of the abstract

This abstract first appeared for US patent application 18478692 titled 'DIFFERENTIATED CONTAINERIZATION AND EXECUTION OF WEB CONTENT BASED ON TRUST LEVEL AND OTHER ATTRIBUTES

Simplified Explanation

The patent application abstract describes a system and method for receiving web content, determining a trust level associated with the content, and mapping the content to an execution environment based on the trust level.

  • Web content is received and its trust level is determined.
  • The content is then mapped to an execution environment based on the trust level.
  • In one example, the content is stored in a trust level specific data container.

Potential Applications

This technology could be applied in:

  • Content filtering systems
  • Secure data storage solutions

Problems Solved

This technology helps in:

  • Ensuring secure execution of web content
  • Preventing malicious content from causing harm

Benefits

The benefits of this technology include:

  • Enhanced security for web content
  • Efficient mapping of content based on trust level

Potential Commercial Applications

This technology could be used in:

  • Cybersecurity software
  • Cloud computing platforms

Possible Prior Art

One possible prior art for this technology could be:

  • Trust-based content filtering systems

Unanswered Questions

How does the system determine the trust level of web content?

The system may use various factors such as source reputation, content analysis, and user feedback to determine the trust level of web content.

What types of execution environments can the web content be mapped to?

The web content can be mapped to various execution environments such as virtual machines, containers, or secure sandboxes based on the trust level.


Original Abstract Submitted

Systems and methods may provide for receiving web content and determining a trust level associated with the web content. Additionally, the web content may be mapped to an execution environment based at least in part on the trust level. In one example, the web content is stored to a trust level specific data container.