Unlock instant, AI-driven research and patent intelligence for your innovation.

Module-by-module verification

A technology of verification device within a module, applied in the direction of program control design, instrument, inter-program communication, etc., can solve problems such as electronic spoofing, achieve the effects of small link parts, avoid redundant verification, and improve testability

Inactive Publication Date: 2005-10-26
SUN MICROSYSTEMS INC
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, in an untrusted situation, such as downloading a module and its pre-verified output from the Internet, an attacker could spoof the pre-verified output, possibly making a malicious class appear benign

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Module-by-module verification
  • Module-by-module verification
  • Module-by-module verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0086] Figure 1A shows a computer of the type suitable for implementing the invention. In the external view in FIG. 1A, the computer system has a central processing unit 100 with disk drives 110A and 110B. Disk drive designations 110A and 110B are merely symbols of a number of disk drives that may be accommodated by the computer system. These disk drives typically include a floppy disk drive, such as 110A, a hard disk drive (not shown externally), and a CD ROM or DVD drive represented by slot 110B. The number and type of drives generally vary with different computer configurations. The computer has a display 120 for displaying information. There is also a keyboard 130 and a mouse 140 which can be used as input devices. The computer shown in FIG. 1A may be a SPARC workstation manufactured by Sun Microsystems, Inc. .

[0087] FIG. 1B shows a block diagram of the internal hardware of the computer of FIG. 1A. Bus 150 serves as the main information backbone for interconnecting...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method, computer program, signal transmission and apparatus pre-verify instructions in a module of a computer program one module-at-a-time. First it is determined whether checking an instruction in a first module which is loaded requires information in a referenced module different than the first module. If the information is required, a constraint for the referenced module is written without loading or otherwise accessing the referenced module. During linking it is determined whether a first module which is loaded has passed pre-verification one-module-at-a-time before linking. A pre-verification constraint on a constrained module is read, if any, if the first module has passed such verification. If any pre-verification constraint is read, the pre-verification constraint is enforced if the constrained module is already loaded.

Description

[0001] This application is related to U.S. Patent Application Serial No. 575,291, filed December 20, 1995, by Yellin and Gosling, entitled "Pre-Verified Byte Code Program Interpreter Apparatus and Method with Data Type Restriction and Object Initialization" (P1000 ), now U.S. Patent No. 5,740,441; U.S. Patent Application Serial No. 14, 1998, by Bracha and Liang, entitled "Method and Apparatus for Type-Safe, Lazy, User-Defined Class Loading." 09 / 134,477 (P3135); these disclosures are hereby incorporated by reference in their entirety. [0002] This application is also related to U.S. Patent Application Serial No. 09 / 321,223 [50253-228] (P3564), filed May 27, 1999, and entitled "Complete Lazy Linking"; U.S. Patent Application Serial No. 09 / 321,226 [50253-230] (P3566) for "Fully Lazy Linking with Module-by-Module Verification"; filed May 27, 1999, entitled "Caching Untrusted Modules for Module-by-Module Verification" U.S. Patent Application Serial No. 09 / 320,581 [50253-235] (P3810...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/54G06F9/44G06F9/445G06F9/45
CPCG06F9/45504G06F9/44521G06F9/44589
Inventor 吉拉德·布拉查梁胜蒂蒙西G·林德霍尔姆
Owner SUN MICROSYSTEMS INC