Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

52results about How to "Ensuring Safe Execution" patented technology

VEX-virtual extension framework

Extensions to operating systems or software applications can be hosted in virtual environments to fault isolate the extension. A generic proxy extension invoked by a host process can coordinate the invocation of an appropriate extension in a virtual process that can provide the same support APIs as the host process. Furthermore, a user mode context can be provided to the extension in the virtual process through memory copying or page table modifications. In addition, the virtual process, especially a virtual operating system process running on a virtual machine, can be efficiently started by cloning a coherent state. A coherent state can be created when a virtual machine starts up, or when the computing device starts up and the appropriate parameters are observed and saved. Alternatively, the operating system can create a coherent state by believing there is an additional CPU during the boot process.
Owner:MICROSOFT TECH LICENSING LLC

Methods and systems for safe execution of guest code in virtual machine context

Methods and systems for safe execution of guest code in virtual machine context are presented. A method for running a virtual machine in a computing system includes (a) launching a virtual machine monitor (VMM) that uses a software debugger; (b) launching a virtual machine (VM) that can natively run safe instructions; (c) determining, at runtime, if the instruction is safe or potentially unsafe; (d) executing safe instructions in a native mode; and (e) activating control logic to process potentially unsafe instructions in the software debugger. The software debugger can bypass at least one of the potentially unsafe instructions. The potentially unsafe instructions include instructions that cannot be safely executed in the context of the VM, and instructions that can cause unpredictable results in the context of the VM.
Owner:PARALLELS INT GMBH

Proactive computer malware protection through dynamic translation

The present invention includes a system and method for translating potential malware devices into safe program code. The potential malware is translated from any one of a number of different types of source languages, including, but not limited to, native CPU program code, platform independent .NET byte code, scripting program code, and the like. Then the translated program code is compiled into program code that may be understood and executed by the native CPU. Before and / or during execution, the present invention causes a scanner to search for potential malware stored in memory. If malware is not detected, the computing device causes the CPU to execute the translated program code. However, execution and / or analysis of potential malware may be interrupted if computer memory that stores potential malware is altered during execution. In this instance, the potential malware now stored in memory is translated into safe program code before being executed.
Owner:MICROSOFT TECH LICENSING LLC

Software-defined wireless communication device

A software-defined wireless communication device is disclosed that includes a hardware platform, which can be digital or analog, as well as platform software that manages the hardware profile and waveform software that manages the signal processing functions. The software-managed hardware profiles are decoupled from the signal processing functionality of the software. In this way, waveform software can be certified, for example for compliance with FCC emissions requirement, independently from the platform software and from the hardware on which the waveform software runs.
Owner:VANU INC

Network configuration predictive analytics engine

A mechanism associated with a network management system (NMS) interprets and predicts the impact on a network of a network configuration change proactively. By providing pre-configuration analysis in this manner, a network administrator can determine the potential effect of the proposed configuration change in advance of actually inserting a configuration command in the network that might otherwise have unforeseen and damaging consequences. The technique is implemented using a predictive analytics engine that receives a proposed network command and, using a current network topology, executes the command against one or more NMS algorithms to verify that the command can be implemented safely.
Owner:IBM CORP

Operating system switching control device and computer system

In a computer system according to the present invention, a switch-source OS controller unit includes: a OS switch request receiver unit configured to receive an OS switch request for requesting that the switch-destination OS in a suspend status becomes the OS in the active status; a switch event notifying unit configured to notify event information to the switch-destination OS or an application on the switch-destination OS, the event information being included in the received OS switch request, and requesting the switch-destination OS or the application on the switch-destination OS to perform a process; and a switch controller unit configured to call the OS switching function, by using the event information as an argument, so that the switch-destination OS becomes the OS in the active status.
Owner:NTT DOCOMO INC

Robot

Described herein is a robot having a camera mount that is movable along a curved surface of an upper part of the head, on a front side thereof, and two units of cameras that are mounted in the camera mount. The cameras are disposed such that the cameras are laterally separated from each other at an interval substantially equivalent to a lateral width of the head, respective extremities of the cameras are substantially flush with the front end of the head, and the cameras are positioned in close proximity of the upper end of the robot.
Owner:HITACHI LTD

Receive processing with network protocol bypass

An adapter is provided with intelligence that allows it to separate the header parts of a packet being received from the payload it carries, and in most cases move the payload directly into a destination buffer at the application layer or file system layer. Copies by the intermediate layers of the protocol stack are bypassed, reducing the number of times that the payload of a communication must be copied by the host system. At the network interface, a plurality of packets is received, and the payload of each is bypassed directly into the target destination buffer. The network interface device identifies the packets which are in the sequence of packets carrying payload to be stored in the target buffer by the flow specification carried with such packets. Also, the packets carrying data payload for the file include a sequence number or other identifier by which the network interface is able to determine the offset within the target buffer to which the packet is to be stored.
Owner:HEWLETT-PACKARD ENTERPRISE DEV LP

Program execution control method, its device, and execution control program for same

Provided are a program execution control method, its device, and an execution control program safely executing an application program containing an untrusted code while reducing overhead. Execution environment creating means (190) creates an execution environment in which access to the outside of the execution environment is limited and arranges at least part of a device driver (112), a library (114), and user data (113) provided in the computer in such a way that the part can be referenced from a program running in the execution environment. Execution control means (160) executes the application program introduced and obtained from an application distribution server (200).
Owner:NEC CORP

Federated system for monitoring physical assets

A system federates heterogeneous monitoring systems to provide end-to-end monitoring information for conveyances with item-layer visibility. A first node of the federated system comprises a first monitoring system and a first port and a second node comprises a second monitoring system and a second port. In parallel with a conveyance being transported between the first node and the second node, the first monitoring system sends an agent to the second monitoring system. The agent comprises logic and / or data necessary to implement processes on the second monitoring agent while the conveyance is at the second port. When the conveyance arrives at the second port, the second monitoring system executes the agent to determine conditions of the conveyance and / or its contents.
Owner:SAVI TECH INC

Illegal analysis / falsification preventing system

A hash function operation system comprises a hash function operation processing device comprising a plurality of hash function operation units connected in multiple stages and incapable of predicting an output from an input, an illegal access detecting device for detecting an illegal access, and an illegal access monitoring device for retrieving an output of an optional stage in a sequence of processings executed by the hash function operation units and inputting the retrieved output to the hash function operation unit in the next stage when the illegal access detecting device shows a state where the illegal access is not detected, the illegal access monitoring device further applying a disturbance to the retrieved output when the illegal access detecting device shows a state where the illegal access is detected and inputting the resulting output to the hash function operation unit in the next stage, wherein falsification is prevented and an encryption key is safely generated by executing the different hash function operations depending on the state of the illegal access.
Owner:PANASONIC CORP

Computer Network Virus Protection System and Method

A network is protected from viruses through the use of a sacrificial server, which may be physical or virtual. Any executable programs or other suspicious parts of incoming e-mail messages are forwarded to a sacrificial server, where they are converted to non-executable format such as Adobe Acrobat PDF and sent to the recipient. The sacrificial server is then checked for virus activity. After the execution is completed, the sacrificial server is rebooted.
Owner:G K WEBB SERVICES

Virtual machine with securely distributed bytecode verification

A system for executing a software application comprising a plurality of hardware independent bytecodes is provided comprising a computing system that generates bytecodes, a virtual machine, remote to the computing system, that receives a plurality of bytecodes from said computing system, and executes said plurality of bytecodes, a system for testing said bytecodes against a set of predetermined criteria in which the testing is securely distributed between said virtual machine and said computing system so that the bytecode verification completed by the computing system is authenticated by the virtual machine prior to the execution of the bytecodes by said virtual machine. A method for distributed bytecode verification is also provided.
Owner:ORACLE INT CORP

Multicore Processor Fault Detection For Safety Critical Software Applications

A method for multicore processor fault detection during execution of safety critical software applications in a multicore processor environment involves dedicating the complete resources of at least a part of at least one processor core to execution of diagnostics software application whilst dedicating remaining resources to execution of a safety-critical software application, thereby enabling parallel execution of the diagnostics software application and the safety-critical software application. There is also provided a controller for multicore processor fault detection during execution of safety critical software applications in a multicore processor environment. The controller includes a multicore processor environment. The controller may be part of a control system. The method may be provided as a computer program.
Owner:ABB (SCHWEIZ) AG

Simulation Apparatus for Manual Operation of Machine Tool

A simulation apparatus 1 includes a touch panel 20, a display controller 11, a display screen data storage unit 12, an input control unit 13, an operation information storage unit 14, a model data storage 16, a simulation executor 15 and an NC program generator 17. The simulation executor 15 displays an image of a movable structure 12 to be operated on the touch panel 20, moves the image in accordance with a manual operation and checks occurrence of interference, and, in the case where interference occurs, stops the movement of the image and displays the occurrence of interference on the touch panel 20. Further, in the case where it is confirmed that no interference occurs, the NC program generator 17 generates an NC program based on manual operation information.
Owner:DMG MORI CO LTD

Mechanism for avoiding check stops in speculative accesses while operating in real mode

A method and processor for avoiding check stops in speculative accesses. An execution unit, e.g., load / store unit, may be coupled to a queue configured to store instructions. A register, coupled to the execution unit, may be configured to store a value corresponding to an address in physical memory. When the processor is operating in real mode, the execution unit may retrieve the value stored in the register. Upon the execution unit receiving a speculative instruction, e.g., speculative load instruction, from the queue, a determination may be made as to whether the address of the speculative instruction is at or below the retrieved value. If the address of the speculative instruction is at or below this value, then the execution unit may safely speculatively execute this instruction while avoiding a check stop since all the addresses at or below this value are known to exist in physical memory.
Owner:IBM CORP

Multiprocessor system for continuing program execution upon detection of abnormality

A multiprocessor system includes a plurality of processors, wherein instruction codes of a program executed by the processors are stored in an internal memory of each of the processors, wherein one of the processors includes a program counter configured to indicate an address of a program instruction being executed in the internal memory and an offset register configured to store a predetermined offset value, and wherein upon detecting abnormality due to execution of an illegal instruction code fetched from the internal memory of the one of the processor, the one of the processor fetches an instruction code for execution from the internal memory of another one of the processors based on an address that is obtained by adding the offset value stored in the offset register to the address of a program instruction being executed stored in the program counter.
Owner:FUJITSU LTD

Computer network virus protection system and method

A network is protected from viruses through the use of a sacrificial server, which may be physical or virtual. Any executable programs or other suspicious parts of incoming e-mail messages are forwarded to a sacrificial server, where they are converted to non-executable format such as Adobe Acrobat PDF and sent to the recipient. The sacrificial server is then checked for virus activity. After the execution is completed, the sacrificial server is rebooted.
Owner:INTELLECTUAL VENTURES I LLC

Underwater unmanned ship-double mechanical arm cooperative control method based on task grading time sequence optimization

ActiveCN112068576AReduce the difficulty of underwater operation controlImprove coordinationAltitude or depth controlControl engineeringManipulator
The invention discloses an underwater operation-oriented underwater unmanned ship-double mechanical arm cooperative motion planning method and an application thereof. According to the invention, underwater double-mechanical-arm control is combined with a planning method based on task grading time sequence optimization, actions needing to be executed by the underwater robot are subdivided into a plurality of tasks, and the execution sequence is reasonably optimized and divided so that dynamic disturbance caused by mechanical arm movement to the underwater unmanned ship is reduced, and the underwater unmanned ship can run more stably. According to the control method, tasks of keeping a hovering height of the unmanned ship and avoiding obstacles are set to be high in priority, and the safetyof equipment is guaranteed as much as possible. A problem that an underwater unmanned ship-double arm manipulator is difficult to control is solved, purposes that the underwater double-arm manipulatoroperates autonomously and safely and an overall operation platform composed of the underwater unmanned ship-double arm manipulator operates stably in pose are achieved, and safe and stable platform technical support is created for improving a underwater operation capacity.
Owner:HUAZHONG UNIV OF SCI & TECH

Information processing apparatus, image pick-up device, information processing method and computer program

A structure is provided that prevents damage to an HDD and loss of recorded data by prohibiting the hard disk from being shifted to the active state in a state in which there is a problem with an environment. On the basis of detection information of each of sensors such as a fall sensor and a temperature sensor, it is determined whether or not data recording or a playback process utilizing the hard disk can be executed safely. The hard disk is caused to be shifted from being in a suspended state to being in an active state on condition that it is determined that safe data recording or playback is possible, and a data recording and playback process utilizing the hard disk is executed. By using this structure, the hard disk is prevented from being shifted to being in the active state in a state in which there is a problem with the environment, for example, in the case of falling, the case of high temperature or high humidity, or the like, and damage to the HDD and loss of recorded data can be prevented.
Owner:SONY CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products