会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • Application security model
    • 应用安全模型
    • US08011008B2
    • 2011-08-30
    • US11939383
    • 2007-11-13
    • Michael D. DownenRaja KrishnaswamyArun MoorthyCharles W. Kaufman
    • Michael D. DownenRaja KrishnaswamyArun MoorthyCharles W. Kaufman
    • G06F17/30
    • G06F21/563G06F21/51
    • Performing security sensitive operations with an application security model. Security agnostic code is executed. The security agnostic code is identified as not having authorization to perform a security sensitive operation. Executing the security agnostic code includes calling code identified as security safe critical code. In response to the security agnostic code calling the security safe critical code, the security safe critical code is executed. The security safe critical code includes functionality for performing validity checks. Executing the security safe critical code includes performing an validity check for the security agnostic code. When the security agnostic code passes the validity check, code identified as security critical code is called. In response to the security safe critical code calling the security critical code, the security critical code is executed. The security critical code is authorized to perform the security sensitive operation.
    • 使用应用程序安全模型执行安全敏感操作。 执行安全不可知代码。 安全性不可知代码被识别为没有执行安全敏感操作的授权。 执行安全性不可知代码包括调用被标识为安全关键代码的代码。 响应安全隐私代码调用安全安全关键代码,执行安全安全关键代码。 安全关键代码包括执行有效性检查的功能。 执行安全安全关键代码包括对安全性不可知代码执行有效性检查。 当安全不可知代码通过有效性检查时,称为安全关键代码的代码。 响应安全关键代码调用安全关键代码,执行安全关键代码。 授权安全关键代码执行安全敏感操作。
    • 5. 发明申请
    • APPLICATION SECURITY MODEL
    • 应用安全模型
    • US20090126011A1
    • 2009-05-14
    • US11939383
    • 2007-11-13
    • Michael D. DownenRaja KrishnaswamyArun MoorthyCharles W. Kaufman
    • Michael D. DownenRaja KrishnaswamyArun MoorthyCharles W. Kaufman
    • G06F21/00
    • G06F21/563G06F21/51
    • Performing security sensitive operations with an application security model. Security agnostic code is executed. The security agnostic code is identified as not having authorization to perform a security sensitive operation. Executing the security agnostic code includes calling code identified as security safe critical code. In response to the security agnostic code calling the security safe critical code, the security safe critical code is executed. The security safe critical code includes functionality for performing validity checks. Executing the security safe critical code includes performing an validity check for the security agnostic code. When the security agnostic code passes the validity check, code identified as security critical code is called. In response to the security safe critical code calling the security critical code, the security critical code is executed. The security critical code is authorized to perform the security sensitive operation.
    • 使用应用程序安全模型执行安全敏感操作。 执行安全不可知代码。 安全性不可知代码被识别为没有执行安全敏感操作的授权。 执行安全性不可知代码包括调用被标识为安全关键代码的代码。 响应安全隐私代码调用安全安全关键代码,执行安全安全关键代码。 安全关键代码包括执行有效性检查的功能。 执行安全安全关键代码包括对安全性不可知代码执行有效性检查。 当安全不可知代码通过有效性检查时,称为安全关键代码的代码。 响应安全关键代码调用安全关键代码,执行安全关键代码。 授权安全关键代码执行安全敏感操作。
    • 7. 发明授权
    • Managing object lifetime in a cyclic graph
    • 在循环图中管理对象生命周期
    • US09053017B2
    • 2015-06-09
    • US13598247
    • 2012-08-29
    • Michael John HillbergRaja Krishnaswamy
    • Michael John HillbergRaja Krishnaswamy
    • G06F12/00G06F17/30G06F12/02
    • G06F17/30303G06F12/0261G06F17/30324
    • The present invention extends to methods, systems, and computer program products for managing object lifetime in a cyclic graph. Embodiments of the invention include reclaiming allocated system resources, for example, from a graph of objects that mixes different resource reclamation techniques (such as reference counting and garbage collection). In response to determining that garbage collection is to be performed, references between GC objects and Ref. Counted objects are detected. A reference type (e.g., direct, indirect, standard, tracked, weakened, etc.) for any detected references is also determined. Garbage collection is performed to determine if any allocated system resources can be reclaimed. Garbage collection considers references and references types between GC objects and Ref. Counted objects when determining if objects are to be reclaimed.
    • 本发明扩展到用于在循环图中管理对象寿命的方法,系统和计算机程序产品。 本发明的实施例包括例如从混合不同的资源回收技术(例如引用计数和垃圾回收)的对象的图形中回收所分配的系统资源。 响应确定要执行垃圾收集,GC对象和参考文献之间的引用。 检测到计数对象。 还确定了任何检测到的参考的参考类型(例如,直接,间接,标准,跟踪,削弱等)。 执行垃圾收集以确定是否可以回收任何已分配的系统资源。 垃圾收集考虑GC对象和Ref之间的引用和引用类型。 确定对象是否要回收时的计数对象。
    • 9. 发明授权
    • Host control of partial trust accessibility
    • 主机控制部分信任可访问性
    • US08402532B2
    • 2013-03-19
    • US11801714
    • 2007-05-10
    • Michael D. DownenRaja KrishnaswamyCharles William KaufmanJames S. MillerStephen Fisher
    • Michael D. DownenRaja KrishnaswamyCharles William KaufmanJames S. MillerStephen Fisher
    • G06F12/14G06F7/04G06F11/30G06F9/44H04L29/06
    • G06F21/52
    • Various technologies and techniques are disclosed for providing host control of partial trust accessibility. A framework allows libraries to be identified as partial trust callers allowed to indicate that the libraries are allowed to be called from partially trusted code by default. The framework allows libraries to be identified as partial trust callers enabled to indicate the libraries could be called from partially trusted code, but not by default. A hosting application is notified that a particular library has been loaded. If the particular library has been identified as partial trust callers allowed, then a determination is received from the hosting application on whether to remove or keep partial trust accessibility for the particular library. If the particular library has been identified as partial trust callers enabled, then a determination is received from the hosting application on whether or not to enable partial trust accessibility for the particular library.
    • 公开了各种技术和技术,用于提供部分信任可访问性的主机控制。 框架允许将库识别为部分信任调用者,以允许默认情况下允许从部分受信任的代码调用库。 框架允许将库识别为启用的部分信任调用者,以指示可以从部分受信任的代码调用库,但不会默认。 通知托管应用程序已加载特定的库。 如果特定图书馆已经被识别为允许的部分信任来电者,则从主机应用程序接收到是否删除或保留特定图书馆的部分信任可访问性的确定。 如果特定库被识别为启用的部分信任调用者,则从托管应用程序接收是否启用特定库的部分信任可访问性的确定。