The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Dec. 01, 2020

Filed:

Jun. 02, 2016
Applicant:

Microsoft Technology Licensing, Llc, Redmond, WA (US);

Inventors:

Navin Narayan Pai, Seattle, WA (US);

Charles G. Jeffries, Sammamish, WA (US);

Giridhar Viswanathan, Redmond, WA (US);

Benjamin M. Schultz, Bellevue, WA (US);

Frederick J. Smith, Remond, WA (US);

Lars Reuther, Kirkland, WA (US);

Michael B. Ebersol, Woodinville, WA (US);

Gerardo Diaz Cuellar, Kirkland, WA (US);

Ivan Dimitrov Pashov, Woodinville, WA (US);

Poornananda R. Gaddehosur, Redmond, WA (US);

Hari R. Pulapaka, Redmond, WA (US);

Vikram Mangalore Rao, Redmond, WA (US);

Assignee:
Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06F 21/53 (2013.01); H04L 12/46 (2006.01); H04L 29/08 (2006.01);
U.S. Cl.
CPC ...
H04L 63/20 (2013.01); G06F 21/53 (2013.01); H04L 12/4641 (2013.01); H04L 63/08 (2013.01); H04L 63/10 (2013.01); H04L 63/1416 (2013.01); H04L 63/1433 (2013.01); H04L 63/1441 (2013.01); H04L 67/02 (2013.01);
Abstract

A host operating system running on a computing device monitors network communications for the computing device to identify network resources that are requested by the computing device. The host operating system compares requested network resources against security policies to determine if the requested network resources are trusted. When an untrusted network resource is identified, the host operating system accesses the untrusted network resource within a container that is isolated from the host operating system kernel using techniques discussed herein. By restricting access to untrusted network resources to isolated containers, the host operating system is protected from even kernel-level attacks or infections that may result from an untrusted network resource.


Find Patent Forward Citations

Loading…