US 12,475,213 B2
Visual indicator of application of security policy
Aleksandr Osipov, Tarrytown, NY (US); Jacob Kazakevich, Manalapan, NJ (US); David Matalon, Great Neck, NY (US); Alexander Chermyanin, Antalya (TR); and Aleksandr Sedunov, Antalya (TR)
Assigned to Venn Technology Corporation, New York, NY (US)
Filed by Venn Technology Corporation, New York, NY (US)
Filed on Aug. 19, 2022, as Appl. No. 17/891,357.
Claims priority of provisional application 63/260,408, filed on Aug. 19, 2021.
Prior Publication US 2023/0059726 A1, Feb. 23, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/53 (2013.01); G06F 9/54 (2006.01); G06F 21/16 (2013.01); G06F 21/31 (2013.01); G06F 21/57 (2013.01); H04L 9/40 (2022.01); G06F 21/10 (2013.01)
CPC G06F 21/53 (2013.01) [G06F 9/547 (2013.01); G06F 21/16 (2013.01); G06F 21/316 (2013.01); G06F 21/577 (2013.01); H04L 63/10 (2013.01); H04L 63/102 (2013.01); H04L 63/105 (2013.01); H04L 63/20 (2013.01); H04L 63/205 (2013.01); G06F 21/1063 (2023.08); G06F 2221/033 (2013.01); G06F 2221/2149 (2013.01)] 23 Claims
OG exemplary drawing
 
1. A method comprising:
receiving, via a user account at a computing machine, a request to access a specified computing resource residing on the computing machine, wherein the specified computing resource is a website, an application or a file;
providing access to the specified computing resource locally on the computing machine and directly through a native computing environment of the computing machine;
determining that the specified computing resource is associated with a security policy, wherein the user account at the computing machine is associated with multiple computing resources residing on the computing machine, a first subset of the multiple computing resources being associated with the security policy and a second subset of the multiple computing resources not being associated with the security policy, wherein the specified computing resource is a member of the first subset of the multiple computing resources;
causing, in response to determining that the specified computing resource is associated with the security policy, a display unit to display, in association with a region of the display unit displaying a visual representation of the specified computing resource, a visual indication that the specified computing resource is associated with the security policy, the visual indication comprising a border for the region, the border occupying points outside the region that are within a distance of n or fewer pixels from the region unless those pixels are occupied by visual representations of other computing resources that are more dominant than the specified computing resource in a computing resource stack, wherein n is a positive integer; and
applying security rules from the security policy to the specified computing resource, wherein the security policy causes tracking, by a tracking service, of use of the first subset of the multiple computing resources, while forgoing causing tracking, by the tracking service, of use of the second subset of the multiple computing resources, wherein the tracking service comprises a cloud-based tracking service that executes externally to the computing machine.