Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

51 results about "Ioctl" patented technology

In computing, ioctl (an abbreviation of input/output control) is a system call for device-specific input/output operations and other operations which cannot be expressed by regular system calls. It takes a parameter specifying a request code; the effect of a call depends completely on the request code. Request codes are often device-specific. For instance, a CD-ROM device driver which can instruct a physical device to eject a disc would provide an ioctl request code to do that. Device-independent request codes are sometimes used to give userspace access to kernel functions which are only used by core system software or still under development.

Application program authority dynamic control method and system

The invention discloses an application program authority dynamic control method and system. The method includes the steps that a new ioctl function injected in a shared library is called when an SM progress receives a service request of an application program; the new ioctl function obtains a progress id number and a service component name for requesting a service, and the progress id number and the service component name are sent to an application program authority dynamic control system; if the system determines that the received service component name exists in an authority application information list corresponding to the progress id number, information of successful matching is sent back to the new ioctl function; if not, a user is prompted to perform configuration; if the system receives a start order of the user, the received service component name is added to the authority application information list corresponding to the progress id number, the information of the successful matching is sent back to the new ioctl function, and the SM progress responds to a service request; if not, the information of failed matching is sent back, and the SM progress refuses the service request. Thus, the application program authority dynamic control method and system are higher in flexibility and universality.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Method and system for acquiring process information of KVM (Kernel-based Virtual Machine)

The invention discloses a method and a system for acquiring the process information of a KVM (Kernel-based Virtual Machine), relating to the technical field of information security. The system disclosed by the invention comprises a system call intercepting and capturing module and an introspection API (Application Program Interface) drive module, wherein the system call intercepting and capturing module is used for intercepting and capturing an IOCTL (Input Output Control) system call initiated by Qemu-kvm and sending called parameters to the introspection API drive module; and the introspection API drive module is used to substitute the Qemu-kvm to initiate the IOCTL system call to the KVM, record a vcpu (virtual central processing unit) which is called by the KVM after response, return the record to the Qemu-kvm, acquire process running in the virtual machine and relevant information of a register, carry out structured processing on the acquired relevant information, expose the relevant information subjected to structured processing to an external program through a process scanning interface, receive a scanning command initiated by the external program and initiate the request to KVM through the vcpu. The invention further discloses the method for acquiring the process information of the KVM. According to the technical scheme disclosed by the invention, the introspection of the information of a process running in the virtual machine can be realized transparently on the premise of not modifying Qemu-kvm and KVM codes.
Owner:BEIJING VENUS INFORMATION TECH +1

Wireless mesh network access security authentication method based on WLAN

InactiveCN101394281AMeet the needs of new features such as dynamic self-organizationImprove compatibilityUser identity/authority verificationMachine controlWireless mesh network
The invention disclose a security certificating method for the access of the wireless mesh network based on a wireless local area network in the technical field of wireless networks. When both certificating sides enter a PLM process used for exchanging security parameters after completing 802.11 open certification; a PLM state machine takes over the operation of a 802.11 state machine; the PLM process is composed of a pair of equivalent link requesting/equivalent link confirming messages respectively sent by both certification sides; a 802.11i/RSN security parameter and a 802.11s/ MSA security parameter are mutually consulted, and a storage key used for pre-certification is selected, and the role of each during the following EAP certification stage is determined; the PLM state machine controls a mechanism for transceiving and retransmitting the message; and when the PLM process is over, the mechanism is recontrolled by the 802.11 state machine, and an internal event calling IOCTL is produced to notify an EAP user end to prepare to begin an EAP certification process and four times of handshake interaction. The method satisfies the new features such as the dynamical self-organization of a WLAN Mesh network, and has reliable safety performance.
Owner:SHANGHAI JIAO TONG UNIV

Implementation method for general register reservation recovery

The invention discloses a method for realizing retention and recovery of a universal register. The process retention method comprises the following steps: enabling a user process to call a system callioctl function; setting a process flag retention / recovery flag bit in the ioctl function; switching a kernel mode to a user mode, and entering judgment on a reservation / recovery flag bit according toa linux signal processing mechanism; if the reservation / recovery flag bit exists, entering a do_work_pending processing function; and storing all the general registers $0-$29 on the kernel stack intoa file or a specified memory by the do_work_pending processing function; according to the process recovery method, the first three steps are the same as the steps of the process retention method, andthe process recovery method also comprises the steps: switching a kernel mode to a user mode, and entering the judgment on a retention / recovery flag bit according to a linux signal processing mechanism; if the reservation / recovery flag bit exists, entering the do_work_pending processing function; and recovering a file or a universal register $0-$29 stored in a specified memory to the kernel stackin the do_work_pending processing function, and returning a user state by the user process after the do_work_pending processing function exits. The problem that a general register is not completely reserved is solved.
Owner:JIANGNAN INST OF COMPUTING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products