Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

50 results about "Process isolation" patented technology

Process isolation is a set of different hardware and software technologies designed to protect each process from other processes on the operating system. It does so by preventing process A from writing to process B.

Safe embedded operating system capable of supporting multi-stage loading

The invention provides a safe embedded operating system capable of supporting multi-stage loading. The safe embedded operating system supports the dynamic loading operation of an application program of an embedded terminal, realizes the isolation of the application program and an embedded terminal platform and comprises a system management module, a safety management module, a resource management module, a functional unit module, a GUI (Graphical User Interface) module, an application execution engine module, an application program interface (API) module and the like. Meanwhile, the safe embedded operating system is at least divided into a basic stage and an expansion stage by adopting stage treatment on the basis of the traditional Linux inner core, a basic stage module is fixedly loaded, each module and each functional module in the expansion stage are selectively and dynamically loaded according to application requirements under the scheduling of a system management framework, and thus, loading the system by stage is realized. By using the safe embedded operating system, a function of safety management and control for the application program through a safe framework module is achieved, mechanisms such as end-to-end safe issuing and loading of an application, safe operation protection based on an application process isolation and trust mechanism, application operation monitoring and the like are applied, and safe management and control on the whole life cycle of the application from issuing, downloading, loading to operating is realized.
Owner:ZHENGZHOU SEANET TECH CO LTD

Process isolation and encryption mechanism based security disc model and generation method thereof

The invention discloses a process isolation and encryption mechanism based security disc model and a generation method thereof. The security disc model comprises a virtual isolating operation module, an I/O agent process encryption/decryption module and a security disc, wherein the virtual isolating operation module is used for acquiring a credible process, and converting the credible process into a controlled process which is forcedly placed in a virtual isolating operation environment for operation; the I/O agent process encryption/decryption module is used for conducting read-write operation on data files in the security disc in the transparent encryption-write/decryption-read manner; the security disc is revealed on a terminal host computer as an ordinary disc partition. The security disc model and the generation method thereof can comprehensively manage and control the credible and controllable operation environment of the terminal security process, the encryption forced filing management of the whole life cycle from storage, conveying, application to destruction of the security files, and the acts of the network, printing, memory leak and the like of a security program operated at the terminal, and realizes whole-process monitoring of the security files.
Owner:HUNAN LANTOSEC SCI & TECH

Protocol adapter framework for integrating non-IIOP applications into an object server container

In a computer system containing an object server, a method and apparatus for providing access to objects and methods via arbitrary remote protocols is disclosed. This includes a mechanism known as the protocol adapter framework that allows protocol adapters to manage remote socket sessions, encrypt communication on this session, translate text to the local character set, perform security validation of the remote user, log incoming work requests, classify the incoming work request for differentiated service purposes, and queue the work for execution. Also, included is a mechanism to invoke the protocol adapter in order to manipulate output from the execution of a method on a server object and send it back to the original requester. This allows the implementers of objects and methods that reside in the object server rather than the owner of the object server to provide a protocol adapter that allows communication with remote clients using any arbitrary protocol that the object implementer deems appropriate. In this way, the object implementer can enjoy benefits such as differentiated service, workload recording, server object process management, process isolation, error logging, systems management and transactional services of running objects in a robust object server container.
Owner:IBM CORP

Securely and efficiently extending data processing pipeline functionality

The present invention extends to methods, systems, and computer program products for securely and efficiently extending data processing pipeline functionality. Data processing agents register, potentially based solely on configuration data contained in the data processing agents, to manipulate data of a data processing pipeline. Configuration data can identify a specified event (e.g., an SMTP verb) the data processing agent is to hook into. Upon detection of a specified event, one or more agents that have registered for the specified event are loaded into secure zones. Process boundaries separate agents from one another and from other processes such that execution of each agent is isolated from other processes. Pipeline related data (e.g., electronic message data) is transferred to each loaded agent. Application Program Interfaces (“APIs”) can be used to transfer data between modules that implement embodiments of the present invention.
Owner:MICROSOFT TECH LICENSING LLC

Centralized calling method and system of peripheral equipment and peripheral equipment calling devices

InactiveCN108255757AImprove securityImplement process isolationBootstrappingComputer terminalCentralized management
The invention provides a centralized calling method and system of peripheral equipment and peripheral equipment calling devices, and relates to the technical field of counter terminals. The method comprises the steps that a business processing device sends a peripheral equipment calling message, a message transceiving layer analyzes the peripheral equipment calling message to obtain the peripheralequipment type and the operation type corresponding to the peripheral equipment calling message, when a logic equipment layer judges that peripheral equipment corresponding to the peripheral equipment type is in an idle state, the operation type is sent to a driving layer; the driving layer converts the peripheral equipment calling message into an information format which can be identified by theperipheral equipment corresponding to the peripheral equipment type according to the peripheral equipment type and the operating type, and the information format is sent to the peripheral equipment corresponding to the peripheral equipment type through a port reading-writing layer. By means of the centralized calling method and system of the peripheral equipment and the peripheral equipment calling devices, through the arrangement of the peripheral equipment calling devices, multiple sets of peripheral equipment are centralizedly managed, progress isolation of peripheral equipment operating parties and calling parties is achieved, and the safety of the calling parties is improved.
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA

Application deployment method and device for PaaS platform, server and storage medium

Embodiments of the application disclose an application deployment method and an application deployment device for a PaaS platform, a server and a storage medium, and belong to the field of PaaS platforms. The application deployment method comprises the steps of: receiving an application deployment command transmitted by a management server, wherein the application deployment command is used for indicating an application server to deploy a target application; creating a target account number and a target data directory for the target application according to the application deployment command,wherein the target account number is used for uniquely identifying the target application, the target data directory comprises application data generated by the target application, and different applications are corresponding to different data directories; binding the target application with the target account number and the target data directory; and deploying the target application under the target account number. Through adoption of the application deployment method in the embodiment, different account numbers are distributed to different applications, thus process isolation among the different applications in the same application server is achieved, and data isolation among the different applications in the same application server is also achieved, thereby improving security of the applications in the PaaS platform.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

Progress-isolated monitoring method and system

InactiveCN102662753AService will not affectReduce Binary CouplingProgram initiation/switchingFault responseData streamProcess module
The invention discloses a progress-isolated monitoring method and system and is designed for overcoming the defects that the whole system breakdown is caused by sudden ending of the progress and further the system cannot provide services for the outside due to the fact that all resources in the whole system are controlled by using a progress in a management platform in the prior art. The progress-isolated monitoring method comprises the following steps: transmitting a preview request to a main progress module by a client; transmitting the preview request to an auxiliary progress module by the main progress module; transmitting a stream instruction to front-end equipment by the auxiliary progress module; receiving the stream instruction and feeding back a data stream to the auxiliary progress module by the front-end equipment; transmitting the data stream to the main progress module by the auxiliary progress module; transmitting the data stream to the client by the main progress module; and receiving the data stream by the client. According to the method and system disclosed by the invention, the technical effects for dividing one system into a plurality of service progresses and enabling various progresses to be mutually impendent without being mutually influenced.
Owner:重庆网力视界科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products