Untrusted component hosting

In a computing environment, one may wish to have interoperability between trusted and untrusted controls/plug-ins allowing for richer expression of content and control within a platform. This can be accomplished by allowing an untrusted plug-in to communicate with a trusted plug-in, while having the...

Full description

Saved in:
Bibliographic Details
Main Authors GEORGE SAM J, KAZA AKHILESH, HARSH MICHAEL R, ALCAZAR MARK, MICHAIL ASHRAF A, GALLO KEVIN T, STEGMAN JOSEPH P
Format Patent
LanguageEnglish
Published 13.08.2013
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In a computing environment, one may wish to have interoperability between trusted and untrusted controls/plug-ins allowing for richer expression of content and control within a platform. This can be accomplished by allowing an untrusted plug-in to communicate with a trusted plug-in, while having the trusted plug-in exercise control over the platform. This allows for the creation of a layered secure approach of communication with a platform, thus allowing for increased application richness in untrusted third party applications.
Bibliography:Application Number: US20080147482