Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

440 results about "Loader" patented technology

In computer systems a loader is the part of an operating system that is responsible for loading programs and libraries. It is one of the essential stages in the process of starting a program, as it places programs into memory and prepares them for execution. Loading a program involves reading the contents of the executable file containing the program instructions into memory, and then carrying out other required preparatory tasks to prepare the executable for running. Once loading is complete, the operating system starts the program by passing control to the loaded program code.

Object oriented apparatus and method for allocating objects on an invocation stack in a partial compilation environment

An object oriented mechanism and method allow allocating Java objects on a method's invocation stack in a partial compilation environment under certain conditions. Only the classes that are visible are taken into account when performing escape analysis in accordance with the preferred embodiments. In a first aspect of the invention, conservative assumptions are made to assure that objects are only allocated on an invocation stack when this can be proven safe by examining only those classes in the compilation unit. In a second aspect of the invention, the concept of visible classes is extended to include other classes that may be found from a user-defined classpath that matches the anticipated run-time classpath used to find classes during program execution. When stack allocation decisions for a method depends on such classes that are outside the compilation unit, two versions of run time code for that method are created. One version allocates all objects from the heap, whereas the other allocates some or all objects on the invocation stack. For each class outside the compilation unit that was examined when making stack allocation decisions for a method, information about the requisite class is stored with the method. At run time, the class loader verifies that the run time version of each requisite class matches all stored information about that class. If all information matches for all requisite classes, the version of the method using stack allocation is safe to use at run time. Otherwise, the method using heap allocation must be used.
Owner:INT BUSINESS MASCH CORP

Trusted boot method and apparatus for mobile operation system

The invention provides a trusted boot method and apparatus for a mobile operation system. The method comprises the steps of powering on a system, executing a Boot ROM Code embedded in an SOC by a CPU, and calling a GMB algorithm of a security encryption chip and a measurement reference value pre-stored in the encryption chip to measure whether a Preloader is trusted or not; if the Preloader is trusted, executing a Preloader code, and calling the GMB algorithm of the security encryption chip and the measurement reference value pre-stored in the encryption chip to measure whether a Boot Loader is trusted or not; if the Boot Loader is trusted, executing a Boot Loader code, and calling the GMB algorithm of the security encryption chip and the measurement reference value pre-stored in the encryption chip to measure whether a kernel is trusted or not; if the kernel is trusted, executing the kernel, and calling the GMB algorithm of the security encryption chip and the measurement reference value pre-stored in the encryption chip to measure whether an application framework is trusted or not; and if the application framework is trusted, executing an application framework code, thereby finishing system boot. By adopting the scheme, the boot security of the mobile operation system can be improved.
Owner:江苏北弓智能科技有限公司

Sandbox shelling method and system based on Android virtual machine

The invention discloses a sandbox shelling method and system based on an Android virtual machine. The method comprises the steps that the Android virtual machine is started, the class loader of a system is replaced with a predefined class loader to load a custom Android virtual machine code package used for shelling of a sandbox, and the run-time environment capable of executing Android shelling codes is obtained; the package name and the main Acitivity name of a to-be-shelled target application are read in the virtual machine, and the context and resource accessing interface of the target application are constructed according to the package name and the main Acitivity name; the resource accessing interface of the target application is constructed to simulate the normal execution procedureof the target application, the context matching with the target application is transmitted to the start parameters of the target application, and program code decryption is conducted on the target application in the sandbox to obtain the program code of the target application. According to the method, the execution environment does not need to provide the highest access authorization, the environmental safety of a device of a user is ensured, and the method is simple to use and high in execution efficiency.
Owner:WUHAN ANTIY MOBILE SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products