Methods, systems, and apparatus for object invocation across protection domain boundaries
A technology for protecting domains and objects, which is applied in the direction of using stored programs for program control, program control design, and multi-programming devices.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] Present systems, apparatus, apparatus, methods, computer program products and machine-readable media will be described in more detail below with reference to the accompanying drawings, in which the described aspects are shown. However, the systems, apparatus, apparatus, methods and machine-readable media may be implemented in many different forms and should not be construed as limited to the aspects set forth herein; rather, the present aspects are provided so that the subject disclosure will be exhaustive and complete, and will convey the scope of the invention to those skilled in the art. Like reference numbers refer to like elements throughout.
[0029] In addition to the above, the word "exemplary" is used herein to mean serving as an example, instance, or illustration. Any aspect or design described herein as "exemplary" should not necessarily be construed as preferred or advantageous over other aspects or designs. Indeed, use of the word "exemplary" is intended ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
