-
公开(公告)号:US10885163B2
公开(公告)日:2021-01-05
申请号:US16039737
申请日:2018-07-19
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: He Huang , Shi Peng Li , Jin Hong Fu , Shi Chong Ma
Abstract: The present disclosure provides a computer-implemented method, computer system and computer program product for user authentication. According to the method, identity information can be received from a user, and a plurality of questions can be presented to the user, the plurality of questions comprising one or more valid questions generated based on a password related to the identity information and one or more invalid questions. Then, an input can be received from the user, and in response to the input corresponding to the one or more valid questions, the user can be authenticated based on the input.
-
公开(公告)号:US20200042331A1
公开(公告)日:2020-02-06
申请号:US16054693
申请日:2018-08-03
Applicant: International Business Machines Corporation
Inventor: Bao Zhang , Jing Lu , Jin Hong Fu , Shi Chong Ma , Xiao Ling Chen , Yuk L. Chan
Abstract: Aspects of the present disclosure are directed to methods, systems, and computer program products for using dynamic-link library based on memory size. In the method, a request for calling a first function in a Dynamic-link library (DLL) at runtime is received first. A size of a memory allocated to the DLL is then determined. Then call relationship of functions in the DLL is obtained. At last, functions related to the first function in the DLL are loaded into the memory allocated to the DLL based on the size of the memory allocated to the DLL and call relationship of functions in the DLL.
-
公开(公告)号:US20240104000A1
公开(公告)日:2024-03-28
申请号:US17936233
申请日:2022-09-28
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Bao Zhang , Jin Hong Fu , Peng Hui Jiang , Shi Chong Ma , He Huang , Jia Yu
IPC: G06F11/36
CPC classification number: G06F11/3636
Abstract: Determination and provision of improved representations of program flow control are provided by a method that monitors execution of binary code of a program on a computer system. The monitoring includes monitoring manipulation(s) of call stack(s) maintained by the computer system for the execution of the binary code. The method, based on the monitoring, determines function call pattern(s) and branch pattern(s) exhibited by the execution of the binary code. The method identifies, from the binary code and using the determined function call pattern(s) and branch pattern(s), function calls and branches, relations between the function calls and branches, and function and variable names. The method also provides a representation of program flow control of the program using the identified function calls and branches, relations, and function and variable names.
-
公开(公告)号:US20240086333A1
公开(公告)日:2024-03-14
申请号:US17930439
申请日:2022-09-08
Applicant: International Business Machines Corporation
Inventor: He Huang , Jin Hong Fu , Shi Chong Ma , Bao Zhang , Jia Yu , Peng Hui Jiang
IPC: G06F12/1036 , G06F12/14 , G06F21/62
CPC classification number: G06F12/1036 , G06F12/145 , G06F21/6254
Abstract: A computer-implemented method, computer program product and computer system are provided. A processor receives an indication of sensitive data in one or more files. A processor updates at least one bit in the virtual address space for the one or more files indicated to have sensitive data. A processor, in response to a program accessing the one or more files, evaluates a respective virtual address for the one or more files. A processor, in response to the at least one bit in the respective virtual address for the one or more files, marks intermediate data generated by the program as sensitive data.
-
公开(公告)号:US11822910B2
公开(公告)日:2023-11-21
申请号:US17501018
申请日:2021-10-14
Applicant: International Business Machines Corporation
Inventor: Bao Zhang , Jin Hong Fu , Shi Chong Ma , He Huang , Yong Yin , Jia Tian Zhong , Xing Xing Shen , Jia Yu
Abstract: Aspects of the invention include includes detecting a change in a code section of a source code in relation to a reference code section. An incremental section is created in object code, the incremental section includes an object code section describing the change in the code section and a symbol section describing a change to a symbol associated with the changed code section. The incremental section is attached to a software update. The software update to a target computer system.
-
公开(公告)号:US20230118695A1
公开(公告)日:2023-04-20
申请号:US17501018
申请日:2021-10-14
Applicant: International Business Machines Corporation
Inventor: Bao Zhang , Jin Hong Fu , Shi Chong Ma , He Huang , Yong Yin , Jia Tian Zhong , XING XING SHEN , Jia Yu
Abstract: Aspects of the invention include includes detecting a change in a code section of a source code in relation to a reference code section. An incremental section is created in object code, the incremental section includes an object code section describing the change in the code section and a symbol section describing a change to a symbol associated with the changed code section. The incremental section is attached to a software update. The software update to a target computer system.
-
公开(公告)号:US11200070B2
公开(公告)日:2021-12-14
申请号:US16054693
申请日:2018-08-03
Applicant: International Business Machines Corporation
Inventor: Bao Zhang , Jing Lu , Jin Hong Fu , Shi Chong Ma , Xiao Ling Chen , Yuk L. Chan
IPC: G06F9/445 , G06F8/41 , G06F8/54 , G06F16/901
Abstract: Aspects of the present disclosure are directed to methods, systems, and computer program products for using dynamic-link library based on memory size. In the method, a request for calling a first function in a Dynamic-link library (DLL) at runtime is received first. A size of a memory allocated to the DLL is then determined. Then call relationship of functions in the DLL is obtained. At last, functions related to the first function in the DLL are loaded into the memory allocated to the DLL based on the size of the memory allocated to the DLL and call relationship of functions in the DLL.
-
公开(公告)号:US20200026827A1
公开(公告)日:2020-01-23
申请号:US16039737
申请日:2018-07-19
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: He Huang , Shi Peng Li , Jin Hong Fu , Shi Chong Ma
Abstract: The present disclosure provides a computer-implemented method, computer system and computer program product for user authentication. According to the method, identity information can be received from a user, and a plurality of questions can be presented to the user, the plurality of questions comprising one or more valid questions generated based on a password related to the identity information and one or more invalid questions. Then, an input can be received from the user, and in response to the input corresponding to the one or more valid questions, the user can be authenticated based on the input.
-
-
-
-
-
-
-