Method for the secure interpretation of programs in electronic devices
A technology of electronic equipment and programs, applied in computer security devices, electrical digital data processing, instruments, etc., can solve problems such as application isolation that have not been proposed, and achieve the effect of improving reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] Reference will now be made in detail to embodiments of the invention, examples of which are illustrated in the accompanying drawings.
[0034] figure 1 is a block diagram showing an example of a directory tree in an electronic device according to the present invention. The electronic device is image 3 shown in . In one embodiment of the invention, the electronic device is a SYMBIAN TM operating system device. The directory tree shows which files crucial to the method are stored in the electronic device according to the invention and how they relate to each other. figure 1 There is a root node 100 , which is connected to subdirectories 101 , 102 and 103 . Subdirectory 101 stores binaries, which implement the interpreter. The interpreter can be, for example, a Java interpreter, a Perl interpreter, a PHP interpreter or a Python interpreter. In subdirectory 101 are files 111, 112 and 113. File 111 includes an engine for an interpreter that either directly executes ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 