eggvur.blogg.se

Sandboxed web browser
Sandboxed web browser











The security model includes the configuration of a system security policy that is stored on a host computer. Packages also preferably include embedded content dissemination rules, selected by the package sender, restricting the dissemination of the content by the recipient.read more read lessĪbstract: Computer-based systems and methods are disclosed for a comprehensive security model for managing active content downloaded from a computer network. Packages preferably include content such as text, data and graphic images. The recipient local agent is operable to (i) receive the package from the control server, (ii) launch a recipient local agent-controlled window or process, (iii) decrypt the encrypted content in the package, and (iv) use or display decrypted content within the recipient local agent-controlled window or process. The control server is operable to receive the package from the sender local agent and transmit the package to the recipient local agent. The sender local agent is operable to (i) receive content generated on the sender electronic device, (ii) generate a package of encrypted content using PKI-based encryption by obtaining at least one public key from the control server, and (iii) send the package to the control server. The system includes a sender local agent (130) associated with a sender electronic device (100) and a recipient local agent (130) associated with a recipient electronic device (100) wherein both the sender and recipient electronic devices are capable of connecting to a control server (200) via the Internet. Only the user device and local gateway have encryption/decryption keys.read more read lessĪbstract: A system for and method of automatically implementing PKI-based encryption between a sender and a recipient. The internet gateway then sends the encrypted electronic instruction to the local gateway, which decrypts the encrypted electronic instruction, interprets it, and generates and transmits a device instruction to communicate with the network-connected device, either directly or through an intermediary device such as a third-party bridge or hub. The user device may then encrypt the electronic instruction and send the encrypted electronic instruction to the internet gateway over a secure connection (e.g., SSH, TLS). The user device may receive an input through a software application and may generate an electronic instruction based on the input.

sandboxed web browser sandboxed web browser

Abstract: A secure connection between a user mobile device and a “Internet-of-Things” network-connected device (e.g., a home appliance or a vehicle) may be provided using an internet gateway residing in the public internet and a local gateway residing in a private network behind a firewall.













Sandboxed web browser