Intel corporation (20240129315). DIFFERENTIATED CONTAINERIZATION AND EXECUTION OF WEB CONTENT BASED ON TRUST LEVEL AND OTHER ATTRIBUTES simplified abstract

From WikiPatents
Jump to navigation Jump to search

DIFFERENTIATED CONTAINERIZATION AND EXECUTION OF WEB CONTENT BASED ON TRUST LEVEL AND OTHER ATTRIBUTES

Organization Name

intel corporation

Inventor(s)

Hong C. Li of El Dorado Hills CA (US)

John B. Vicente of Roseville CA (US)

Prashant Dewan of Hillsboro OR (US)

DIFFERENTIATED CONTAINERIZATION AND EXECUTION OF WEB CONTENT BASED ON TRUST LEVEL AND OTHER ATTRIBUTES - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240129315 titled 'DIFFERENTIATED CONTAINERIZATION AND EXECUTION OF WEB CONTENT BASED ON TRUST LEVEL AND OTHER ATTRIBUTES

Simplified Explanation

The patent application describes a system and method for receiving web content, determining its trust level, and mapping it to an execution environment based on that trust level.

  • Web content is received and its trust level is determined.
  • The web content is then mapped to an execution environment based on the trust level.
  • In one example, the web content is stored to a trust level specific data container.

Potential Applications

This technology could be applied in:

  • Content filtering systems
  • Secure browsing environments

Problems Solved

This technology helps in:

  • Ensuring safe execution of web content
  • Preventing malicious attacks from untrusted sources

Benefits

The benefits of this technology include:

  • Improved security for web browsing
  • Enhanced trustworthiness of web content

Potential Commercial Applications

This technology could be commercially applied in:

  • Cybersecurity software
  • Web hosting services

Possible Prior Art

One possible prior art for this technology could be:

  • Existing content filtering systems that assess trust levels of web content.

Unanswered Questions

How does this technology determine the trust level of web content?

The system may use various algorithms and criteria to assess the trustworthiness of web content, but the specific methods are not detailed in the abstract.

What types of execution environments can the web content be mapped to based on its trust level?

The abstract mentions mapping web content to an execution environment based on trust level, but it does not specify the types of environments or how this mapping process works.


Original Abstract Submitted

systems and methods may provide for receiving web content and determining a trust level associated with the web content. additionally, the web content may be mapped to an execution environment based at least in part on the trust level. in one example, the web content is stored to a trust level specific data container.