Resource access method, computing device and readable storage medium
A computing device and resource access technology, applied in the computer field, can solve problems such as hidden security risks, and achieve the effects of improving security, realizing isolation, and avoiding mutual influence.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0021] An exemplary embodiment of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although the exemplary embodiments of the present disclosure are shown, it is understood that the disclosure can be implemented in various forms without limitation. Instead, these embodiments are provided to be more thoroughly understood to disclose the present disclosure, and can communicate the scope of the scope of the present disclosure to those skilled in the art.
[0022] The sandbox environment is a virtual system program that creates a stand-alone operating environment that allows other programs such as plug-ins in the sandbox environment to achieve resource isolation, and programs running in the sandbox cannot communicate with external programs.
[0023] Taking the Linux operating system as an example, the working principle of the sandbox environment will be described. Through the operating system's NameSpace (namespace) to implement th
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap