18478692. DIFFERENTIATED CONTAINERIZATION AND EXECUTION OF WEB CONTENT BASED ON TRUST LEVEL AND OTHER ATTRIBUTES simplified abstract (Intel Corporation)
Contents
- 1 DIFFERENTIATED CONTAINERIZATION AND EXECUTION OF WEB CONTENT BASED ON TRUST LEVEL AND OTHER ATTRIBUTES
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 DIFFERENTIATED CONTAINERIZATION AND EXECUTION OF WEB CONTENT BASED ON TRUST LEVEL AND OTHER ATTRIBUTES - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
DIFFERENTIATED CONTAINERIZATION AND EXECUTION OF WEB CONTENT BASED ON TRUST LEVEL AND OTHER ATTRIBUTES
Organization Name
Inventor(s)
Hong C. Li of El Dorado Hills CA (US)
John B. Vicente of Roseville CA (US)
Prashant Dewan of Hillsboro OR (US)
DIFFERENTIATED CONTAINERIZATION AND EXECUTION OF WEB CONTENT BASED ON TRUST LEVEL AND OTHER ATTRIBUTES - A simplified explanation of the abstract
This abstract first appeared for US patent application 18478692 titled 'DIFFERENTIATED CONTAINERIZATION AND EXECUTION OF WEB CONTENT BASED ON TRUST LEVEL AND OTHER ATTRIBUTES
Simplified Explanation
The patent application abstract describes a system and method for receiving web content, determining a trust level associated with the content, and mapping the content to an execution environment based on the trust level.
- Web content is received and its trust level is determined.
- The content is then mapped to an execution environment based on the trust level.
- In one example, the content is stored in a trust level specific data container.
Potential Applications
This technology could be applied in:
- Content filtering systems
- Secure data storage solutions
Problems Solved
This technology helps in:
- Ensuring secure execution of web content
- Preventing malicious content from causing harm
Benefits
The benefits of this technology include:
- Enhanced security for web content
- Efficient mapping of content based on trust level
Potential Commercial Applications
This technology could be used in:
- Cybersecurity software
- Cloud computing platforms
Possible Prior Art
One possible prior art for this technology could be:
- Trust-based content filtering systems
Unanswered Questions
How does the system determine the trust level of web content?
The system may use various factors such as source reputation, content analysis, and user feedback to determine the trust level of web content.
What types of execution environments can the web content be mapped to?
The web content can be mapped to various execution environments such as virtual machines, containers, or secure sandboxes based on the trust level.
Original Abstract Submitted
Systems and methods may provide for receiving web content and determining a trust level associated with the web content. Additionally, the web content may be mapped to an execution environment based at least in part on the trust level. In one example, the web content is stored to a trust level specific data container.