Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

35results about How to "Prevent execution" patented technology

Processor with a function to prevent illegal execution of a program, an instruction executed by a processor and a method of preventing illegal execution of a program

The present invention provides an improved technology of preventing illegal use and execution of a software program provided to a computer system. More particularly, the present invention is directed to a Processor of a type in which a memory managing unit is installed therein to manage storing operation of code / data in main memory and includes, as one of instruction set, an execution permitting instruction to permit execution of a program code (application) in the main memory. The procedure of execution permitting instruction is defined by a microprogram and includes an authentication procedure for authenticating the right to use the program beside a procedure for setting predetermined data in the memory managing unit in this invention. Execution of the software program is permitted only when the authentication processing is completed successfully. Because the authentication operation is performed within the processor, it is almost impossible to monitor or detect it from the exterior. Also, by using a processor ID unique to the processor chip as identification information for use in the authentication processing, the right to use a specific software program can be limited to a single processor.
Owner:GOOGLE LLC

Information processing apparatus, executability determining method, and computer program for the same

The present invention provides an information processing apparatus, an executability determining method and a computer program for the same. The information processing apparatus according to the present invention includes a list fetching section for fetching from outside disabled contents list information indicating disabled contents information disabling execution of an application program, when the contents data is subjected to a contents data reproducing/copying process for at least reproducing or copying the contents data, including a type and/or a version of the application program; and a verifying section for verifying a type and/or a version of an application program identified by referring to a starting file fetched together with the disabled contents list from the outside to at least one or more disabled contents information described in the disabled contents list information. When it is determined as a result of verification that a type and/or a version of the application program identified by referring to the starting file corresponds to a type and/or a version of any disabled application program described in the disabled contents list information, the starting file is not distributed to the application program.
Owner:SONY CORP

Vehicle voice input control method for intelligent traveling

InactiveCN108099816AEnsure time-to-time accuracyAlert and prevent drivingSpeech recognitionElectric/fluid circuitIn vehicleControl system
The invention provides a vehicle voice input control system for intelligent traveling. The vehicle voice input control system comprises a main voice system and an auxiliary voice identification systemand is characterized in that the signal transmission of the auxiliary voice identification system and the signal transmission of the main voice system are synchronous, the auxiliary voice identification system and the main voice system are connected with a central control module, and the auxiliary voice identification system and the main voice system perform cross verification and identification;the auxiliary voice identification system comprises a fatigue driving identification control system built in the auxiliary voice identification system. The vehicle voice input control system has theadvantages that mutual verification and correction can be achieved by the cross verification and identification of the auxiliary voice identification system and the main voice system, false instruction implementation can be prevented effectively, fatigue driving can be prevented, the accuracy of intelligent voice input is increased greatly, and a foundation is laid for the accurate instruction receiving of the communication between other vehicular accessories in vehicles and the Internet of Vehicles, between the vehicles and homes, and the like.
Owner:WUHU WANJIANG INTPROP OPERATION CENT CO LTD

Method and Apparatus for Trusted Execution of Applications

A system and methodology for providing trusted execution of applications is provided. The computing system includes system hardware including memory. A Trusted Application Execution Provisioning (TAEP) operating on said computing system enforces a Trusted Application Pattern Space (TAPS) within the memory throughout the execution lifecycle of each application hosted on the computing system. The Trusted Application Execution Provisioning (TAEP) assigns each application a private application instruction space and a private application data in accordance with specifications governing the Trusted Application Pattern Space (TAPS), such that the Trusted Application Execution Provisioning (TAEP) prevents the private application instruction space of each application from being read, inferred, and/or modified by any application, and prevents the private application data space of each application from being read, inferred, and/or modified by other than its assigned application. Upon an extension request by a first application to extend with one or more collaborating applications, the Trusted Application Execution Provisioning (TAEP) assigns an application collaboration data space within the memory in accordance with the specifications governing the Trusted Application Pattern Space (TAPS), such that both the first application and the one or more collaborating applications have access to the application collaboration data space. The Trusted Application Execution Provisioning (TAEP) prevents the application collaboration space from being read, inferred, and/or modified by other than the first application and the one or more collaborating applications.
Owner:CHARLES STARK DRAPER LABORATORY

Method of interacting commands of transformer substation based on third-party verification

ActiveCN104135472AControl control authorityControl rangeTransmissionThird partyTransformer
The invention discloses a method of interacting commands of a transformer substation based on third-party verification. A third-party certification device CA (Certificate Authority) is introduced to verify permission and identity of both parties of the commands, the CA is utilized as a trusted source, and credibility of the CA is guaranteed by adopting an intelligent card or a digital certificate technology, so that control permission and range of a target IED (Intelligent Electronic Device) can be effectively controlled to prevent command information from being intercepted and tampered; the third-party certification device CA is utilized to repackage the command information, so that security of transmission information is guaranteed; a hashed value is used for verifying integrity of mutual information, so that wrong data are effectively filtered, execution of the bad command is prevented, and information security of a control process of the transformer substation can be greatly improved. The method has the beneficial effects that: security of transmission of a control signal in the transformer substation is improved, so that the signal is prevented from being intercepted or tampered, security of data is guaranteed, operation crowd is limited, illegal users are isolated, information security is protected, the wrong data are effectively filtered, and execution of the bad command is prevented.
Owner:NARI TECH CO LTD

Washing machine control method

In a method of controlling to a water supplying step and a water draining step in a washing machine having no anti-siphoning device, an error state is determined when water supplying and water draining are simultaneously performed. The error state is determined for cases where there is no change in water level after supplying water for a predetermined time. In such cases, water is then re-supplied after a complete draining. The method includes steps of (a) sensing an initial level of water remaining in the washing machine; (b) storing in a memory a value indicative of the sensed initial water level if the sensed initial water level exceeds a predetermined substantive amount and executing a first water supplying step; (c) discharging the remaining water from the washing machine, executing a second water supplying step, and sensing a current water level if the sensed initial water level is less than the predetermined substantive amount; (d) determining a water level variation based on the sensed current water level and the stored value; (e) repeating the step (c) if the determined water level variation continues to be less than a predetermined value for a first predetermined time period; (f) displaying an internal error if the determined water level variation continues to be less than the predetermined value after a predetermined number of repetitions of the step (e); and (g) executing a user-selected washing step if the determined water level variation exceeds the predetermined value.
Owner:LG ELECTRONICS INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products