US 12,380,204 B2
Indicator of security policy application for a portion of resources on a machine
Aleksandr Osipov, Tarrytown, NY (US); Jacob Kazakevich, Manalapan, NJ (US); David Matalon, Great Neck, NY (US); Alexander Chermyanin, Antalya (TR); and Aleksandr Sedunov, Antalya (TR)
Assigned to Venn Technology Corporation, New York, NY (US)
Filed by Venn Technology Corporation, New York, NY (US)
Filed on Aug. 18, 2022, as Appl. No. 17/890,879.
Claims priority of provisional application 63/260,408, filed on Aug. 19, 2021.
Prior Publication US 2023/0054350 A1, Feb. 23, 2023
Int. Cl. H04L 9/40 (2022.01); G06F 9/54 (2006.01); G06F 21/16 (2013.01); G06F 21/31 (2013.01); G06F 21/53 (2013.01); G06F 21/57 (2013.01); G06F 21/10 (2013.01)
CPC G06F 21/53 (2013.01) [G06F 9/547 (2013.01); G06F 21/16 (2013.01); G06F 21/316 (2013.01); G06F 21/577 (2013.01); H04L 63/10 (2013.01); H04L 63/102 (2013.01); H04L 63/105 (2013.01); H04L 63/20 (2013.01); H04L 63/205 (2013.01); G06F 21/1063 (2023.08); G06F 2221/033 (2013.01); G06F 2221/2149 (2013.01)] 23 Claims
OG exemplary drawing
 
1. A method comprising:
storing, within a single user account at a computing machine, multiple unsupervised computing resources and multiple supervised computing resources, wherein the multiple supervised computing resources are associated with a security policy;
receiving, from a user of the computing machine, a request to access a specified supervised computing resource from among the multiple supervised computing resources;
providing access to the specified supervised computing resource locally on the computing machine and directly through a native computing environment of the computing machine;
causing a display unit to display, at a display position related to a region of the display unit displaying the specified supervised computing resource, an indicator that the specified supervised computing resource is associated with the security policy, the indicator comprising a border for the region, the border occupying points outside the region that are within a distance of n or fewer pixels from the region unless those pixels are occupied by visual representations of other computing resources that are more dominant than the specified supervised computing resource in a computing resource stack, wherein n is a positive integer; and
applying security rules from the security policy to the specified supervised computing resource.