摘要:
Technologies for monitoring system API calls include a computing device with hardware virtualization support. The computing device establishes a default memory view and a security memory view to define physical memory maps and permissions. The computing device executes an application in the default memory view and executes a default inline hook in response to a call to an API function. The default inline hook switches to the security memory view using hardware support without causing a virtual machine exit. The security inline hook calls a security callback function to validate the API function call in the security memory view. Hook-skipping attacks may be prevented by padding the default inline hook with no-operation instructions, by designating memory pages of the API function as non-executable in the default memory view, or by designating memory pages of the application as non-executable in the security memory view. Other embodiments are described and claimed.
摘要:
A process integration system to interface between a sender system and a receiver system is described. The process integration system has a sender adapter, an integration engine, a receiver adapter, and a language converter module. The sender adapter receives a communication in a first language from the sender system. The communication is in a first format of the sender system. The sender adapter converts the communication into a second format of the process integration system, and the integration engine identifies the receiver system from the communication in the second format. The receiver adapter converts the communication from the second format to a third format of the receiver system, and sends the communication in the third format and in a second language to the receiver system. The language converter module translates the communication in the third format to the second language associated with the receiver system.
摘要:
A method and apparatus for identifying referenced content within an online presentation environment. Upon entry of a statement related to specific content being presented within the online presentation environment, the method and apparatus identify the specific content within the presentation and, upon subsequent selection of the statement, display the specific content.
摘要:
A check service provider enables users to make and receive payments from a financial account via a mobile electronic device, such as a smartphone or tablet computer. The device includes a check module and a camera. A user can capture an image of a check using the camera and the check module deciphers information, such as an account number, bank routing number, and information regarding the account holder, from the image of the check. The user can then make payments from and receive payments into the financial account associated with the imaged check via the check module without having the physically write or deposit a check. The check service provider interacts with the ACH to settle payments directly between the user's accounts without handling the money. Users can be notified of pending payments via text, voice, and e-mail messaging.
摘要:
A thermal management configuration for a flip chip semiconductor device is disclosed. The device includes a high power silicon based die having a metal bonding surface. A plurality of interconnects are formed on the metal surface and connected to a substrate. A plurality of thermal management stud bumps are formed on the metal bonding surface, the thermal management stud bumps positioned distinct from the interconnects and local to die hot spots, exposed ends of the thermal management stud bumps spaced from the substrate.
摘要:
A network-based transaction processing system allows online users to flexibly and efficiently make payments using a combination of different payment instruments. The system includes a user interface through which each user can define one or more personal payment plans. Each such payment plan specifies a plurality of payment instruments, and includes rules that specify how the monetary amount associated with a transaction is to be divided among these payment instruments. These rules may be non-transaction-specific, such that a user can re-use a payment plan over time to complete multiple transactions. In one embodiment, a user can specify an order in which the payment instruments are to be applied, and can specify per-transaction maximum monetary amounts to be charged to specific instruments.
摘要:
A semiconductor device (100A) with plastic encapsulation compound (102) and metal sheets (103a and 104) on both surfaces, acting as heat spreaders. One or more thermal conductors (103a) of preferably uniform height connect one sheet (103b) and the chip surface (101a); the number of conductors is scalable with the chip size. Each conductor consists of an elongated wire loop (preferably copper) with the wire ends attached to a pad (105), preferably both ends to the same pad. The major loop diameter is approximately normal to the first surface and the loop vertex in contact with the sheet (103b). The substrate (104, preferably a second metal sheet) covers at least portions of the second package surface and is thermally conductively connected to the chip.
摘要:
Techniques are described for facilitating interactions between computing systems, such as by performing transactions between parties that are automatically authorized via a third-party transaction authorization system. In some situations, the transactions are programmatic transactions involving the use of fee-based Web services by executing application programs, with the transaction authorization system authorizing and/or providing payments in accordance with private authorization instructions previously specified by the parties. The authorization instructions may include predefined instruction rule sets that regulate conditions under which a potential transaction can be authorized, with the instruction rule sets each referenced by an associated reference token. After one or more of the parties to a potential transaction supply reference tokens for the parties, the transaction authorization system can determine whether to authorize the transaction based on whether the instruction rule sets associated with the reference tokens are compatible or otherwise satisfied.
摘要:
Techniques are described for facilitating interactions between computing systems, such as by performing transactions between parties that are automatically authorized via a third-party transaction authorization system. In some situations, the transactions are programmatic transactions involving the use of fee-based Web services by executing application programs, with the transaction authorization system authorizing and/or providing payments in accordance with private authorization instructions previously specified by the parties. The authorization instructions may include predefined instruction rule sets that regulate conditions under which a potential transaction can be authorized, with the instruction rule sets each referenced by an associated reference token. After one or more of the parties to a potential transaction supply reference tokens for the parties, the transaction authorization system can determine whether to authorize the transaction based on whether the instruction rule sets associated with the reference tokens are compatible or otherwise satisfied.
摘要:
Techniques are described for facilitating interactions between computing systems, such as by performing transactions between parties that are automatically authorized via a third-party transaction authorization system. In some situations, the transactions are programmatic transactions involving the use of fee-based Web services by executing application programs, with the transaction authorization system authorizing and/or providing payments in accordance with private authorization instructions previously specified by the parties. The authorization instructions may include predefined instruction rule sets that regulate conditions under which a potential transaction can be authorized, with the instruction rule sets each referenced by an associated reference token. After one or more of the parties to a potential transaction supply reference tokens for the parties, the transaction authorization system can determine whether to authorize the transaction based on whether the instruction rule sets associated with the reference tokens are compatible or otherwise satisfied.