Systems and methods that enable execution of applications at appropriate trust levels are described. These systems and methods can determine appropriate trust levels by comparing applications' permitted trust levels with their requested trust levels. These systems and method can determine applications' permitted trust levels by comparing applications' execution locations with their published locations. Applications can also be executed at a restricted trust level at which potentially dangerous operations are prohibited.

 
Web www.patentalert.com

< Use of hashing in a secure boot loader

> System and method of selectively scanning a file on a computing device for malware

> Technique to allow a first transaction to wait on condition that affects its working set

~ 00586