Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

50results about "Program control" patented technology

Method and apparatus for providing network security using security labeling

ActiveUS20050097357A1Reduces potential leakageImprove network securityDigital data processing detailsMultiple digital computer combinationsNetwork security policySecurity level
A method and apparatus for providing network security using security labeling is disclosed. The method includes comparing first security level information and second security level information, and indicating processing to be performed on the packet based on the comparing. The first security level information is stored in a security label of a packet received at a network node, while the second security level information is stored at the network node.
Owner:CISCO TECH INC

Method for Weighted Voting in a Public Safety Distributed Ledger

PendingUS20200134760A1Voting apparatusForecastingComputer networkEngineering
A computer-implemented method and apparatus allow for weighted voting in a public safety distributed ledger. A first node operating in a distributed ledger network receives an incident data record of one or more other nodes to maintain a distributed ledger. The first node reviews the incident data record to determine a vote. The vote indicates whether the incident data record should be entered into the distributed ledger. The vote is sent to a second node operating in the distributed ledger network. Votes are received from the one or more other nodes, and weights are determined for each node operating in the distributed ledger network node. A weighted vote result is calculated utilizing the votes and the weights. The distributed ledger is updated with the incident data record when the weighted vote result is greater than or equal to a predetermined threshold.
Owner:MOTOROLA SOLUTIONS INC

Compile time linking via hashing technique

InactiveUS20060130020A1Simple processRapid techniqueLink editingProgram controlAddress resolutionMachine code
A linker is usually used, in post processing of compiling high-level languages such as C into machine executable language, to bind separately compiled object files and resolve the addresses (142) of global variables (140) declared in the separate files. The invention proposes linking during compile time by using a special purpose hash table called global variables hash table (130) shared among the separate files. This results in a collection of processed object files that are coherent in terms of their addresses (142) for global variables (140) that could be further assembled correctly into machine executable code. This method is useful for compiling separate high level language source files to generate executable machine code employing a technique of address resolution across separate modules.
Owner:AXIOMATIC SOLUTIONS

System and method for securing computers against computer viruses

ActiveUS8458797B1Memory loss protectionDigital data processing detailsProgramming languageAntidote
In one embodiment, an antivirus mechanism (e.g., antivirus program) in a computer initiates shielding procedures in response to a triggering event indicative of a presence of a virus in the computer, the virus being of a type not recognized by the antivirus program. The shielding procedures advantageously protect important components of the computer while the antivirus program does not have the requisite antidote to directly deal with the virus.
Owner:TREND MICRO INC

Copy protection built into a network infrastructure

InactiveUS7516322B1Copy protection is reinforcedPrevent easy circumventionMultiple digital computer combinationsProgram controlDigital contentDigital signature
A method for a network infrastructure copy protection system. The method includes the step of applying a digital signature to a digital content file prior to transmission. Digital content files that are to be legitimately transmitted across the distributed computer network are modified by the application of digital signatures corresponding to the sender. As content files are transmitted across a distributed computer network, the distributed computer network examines the content files to determine whether they include the digital signatures. The examining is performed by hardware comprising the infrastructure of the distributed computer network. When content files include respective digital signatures, the content files are transmitted by the infrastructure. When the content files do not include the digital signatures, transmission of those content files not having digital signatures is blocked. The digital signatures are configured to identify the senders of the digital content files. The digital signatures can be logged within the distributed computer network to maintain a record of the digital content files as they are transmitted. The hardware performing the examining can be a plurality of routers or a plurality of cache engines within the distributed computer network.
Owner:CISCO TECH INC

Memory resource optimization method and device

InactiveCN104572493AImplementing Collaborative Partitioning StrategiesReduce mutual interferenceMemory architecture accessing/allocationError detection/correctionOperational systemMultilevel memory
Embodiments of the present invention relate to the field of computer. Provided are a memory resource optimization method and an apparatus, solving a mutual impact problem between existing multi-level memory resources and optimizing an existing unitary division mechanism. A specific scheme is: obtaining performance data of each program in a working set through a page coloring technology, obtaining a category of the each program by incorporating memory access frequency, selecting a page coloring division policy corresponding to the working set based on the category of the each program, inputting the page coloring division policy into an operating system kernel, and completing corresponding coloring division processing. The present invention is used for incorporating features of the working set to eliminate or reduce mutual interference of processes and threads on memory resources, improving overall performance of a computer.
Owner:HUAWEI TECH CO LTD +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products