Unlock instant, AI-driven research and patent intelligence for your innovation.

Methods, systems, and apparatus for object invocation across protection domain boundaries

A technology for protecting domains and objects, which is applied in the direction of using stored programs for program control, program control design, and multi-programming devices.

Inactive Publication Date: 2013-12-04
QUALCOMM INC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, interprocess communication using pipes is inefficient because two separate copy operations are involved in each direction
[0007] Shared memory can also be used for interprocess communication; however, implementing shared memory requires the two protection domains to agree on a non-general data sharing scheme
It is worth noting that agreeing on non-general data sharing schemes is not easy to achieve, because the calling process needs to predict how the receiving process will receive the data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods, systems, and apparatus for object invocation across protection domain boundaries
  • Methods, systems, and apparatus for object invocation across protection domain boundaries
  • Methods, systems, and apparatus for object invocation across protection domain boundaries

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Present systems, apparatus, apparatus, methods, computer program products and machine-readable media will be described in more detail below with reference to the accompanying drawings, in which the described aspects are shown. However, the systems, apparatus, apparatus, methods and machine-readable media may be implemented in many different forms and should not be construed as limited to the aspects set forth herein; rather, the present aspects are provided so that the subject disclosure will be exhaustive and complete, and will convey the scope of the invention to those skilled in the art. Like reference numbers refer to like elements throughout.

[0029] In addition to the above, the word "exemplary" is used herein to mean serving as an example, instance, or illustration. Any aspect or design described herein as "exemplary" should not necessarily be construed as preferred or advantageous over other aspects or designs. Indeed, use of the word "exemplary" is intended ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Methods, apparatus, systems, and computer program products for invoking remote process calls and facilitating inter-process communications in a protected memory system employ a kernel that supports remote invocation of objects by a system call. The system call may include an object identifier and a set of pointers to input and output buffers. The kernel locates the specified object in a separate server process domain and awakens a server thread within the server domain to invoke the object. Using provided memory pointers, the kernel can copy input and output data across the protection domains in a single step without the need for copying data into an intermediate buffer. This eliminates the overhead of multiple data copy steps that are required in conventional protected memory systems.

Description

[0001] Claim of priority under 35 U.S.C. §119 [0002] This patent application claims the 60th / 867,787, assigned to the present assignee and expressly incorporated herein by reference. technical field [0003] The described aspects relate to data processing methods, and more particularly, to methods and systems for efficiently invoking objects and replicating data across protection domain boundaries in a computer system partitioned into different protection domains. Background technique [0004] Computer systems implementing a protected-mode operating system segment physical memory into separate virtual address spaces or regions that can be accessed by certain processes or protection domains. Some memory is allocated to and accessible only by the kernel of a computer system, known as kernel space or kernel domain, while other memory is made accessible by applications, known as user space or user domain. When multiple processes are running concurrently, each process is as...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/54
CPCG06F9/547G06F9/06G06F9/54G06F15/16
Inventor 布莱恩·H·凯利克里斯托弗·S·厄克特拉梅什·钱德拉塞卡尔罗伯特·G·沃克
Owner QUALCOMM INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More