摘要:
A method for accessing a file for editing includes limiting access permissions of an application to one or more directories including a first directory and receiving a request to edit the file stored in a second directory using the application. The second directory is not included in the one or more directories available to the application. The file is copied from the second directory to the first directory.
摘要:
A computer application is run within a restricted user account including permissions to access contact information for at least one computer system. If a computer virus infects the application, the application uses the contact information to send a message to only authorized computers including the at least one alert computer.
摘要:
A method of launching an application in a computer system, the method comprising launching the application in a restricted user account, intercepting at least one request for an operation on a file, the at least one request comes from launching the application, determining whether the at least one file operation request is acceptable, and responsive to the at least one file operation request determined to be acceptable, forwarding the file operation request for the operation on the file on behalf of the application launched in the restricted user account.
摘要:
A user is provided a non-degraded presentation experience from data while access to the non-degraded presentation experience is limited. In an embodiment, one or more attributes are gathered from one or more sources. The data is accessed. Further, the data is adapted using the one or more attributes so that availability of the non-degraded presentation to the user is dependent on the one or more attributes. Examples of attributes include user attributes, environmental attributes, and presentation attributes.
摘要:
In one aspect, a data race condition is detected based on an address of a variable shared by at least first and second threads for executing the program code, the shared variable address being stored in a hardware table. Detection of the data race condition in the program code is reported. In another aspect, at least first and second threads for executing the program code are synchronized based on an address of a variable shared by the threads and stored in a hardware table.
摘要:
A method and system for cryptographically secure hashed end marker of streaming data. In one embodiment, a method for transmitting streaming data comprises establishing a shared secret between a receiving participant and a sending participant; using the shared secret to initialize a cryptographically secure hashed end of file marker for the streaming data that is updated as the streaming data is transmitted or received; transmitting the streaming data from the sending participant to the receiving participant; and comparing the streaming data with the cryptographically secure hashed end of file marker to determine when an end of the streaming data occurs.
摘要:
This disclosure provides a method and apparatus for processing descriptive statements. More particularly, this disclosure provides a way of quickly and reliably signing and authenticating RDF statements without requiring a data sort. By using a commutative hashing function that combines multiple independent hashes, ideally one per serialized statement, signing and verifying can each be completed without a data sort; inclusion of an “extra” identifier, e.g., the total number of RDF statements, may enhance the security of the signed statements by helping minimize exposure to potential attackers. The disclosure also describes how to later add additional statements to an existing signature and hash using an incremental process. Effective blank node handling may also achieved using this incremental process by requiring intermediate machines to add a new “reverse-labeling” statement each time a blank node is locally assigned; the new statement, essentially provides information to permit downstream to reverse the labeling process and thereby reliably verify authentic the original RDF statements.
摘要:
In one aspect, a value of a variable shared by multiple threads for executing the program code is stored in a thread-local variable. A data race condition is detected based on a comparison of values of the shared variable and the thread-local variable. Detection of the data race condition is reported. In another aspect, a machine-readable instruction to store in a thread-local variable a value of a variable shared by multiple threads for executing the program code is generated. A machine-readable instruction to detect a data race condition based on a comparison of values of the shared variable and the thread-local variable is generated. The machine-readable instructions are stored in a machine-readable medium.
摘要:
A system and method is illustrated for a reader to receive account data associated with an account managed by a financial institution, the account to be accessed to pay an amount associated with an ultra-low latency transaction. The system and method may also include a receiver to receive an instruction authorizing completion of the ultra-low latency transaction, the instruction generated based upon a comparison of the account data to an entry in a list that includes a plurality of account data. Additionally, the system and method may include a mechanism to allow completion of the ultra-low latency transaction.
摘要:
Embodiments of the present invention include a system and method for making it safe to execute downloaded code. The method includes accessing an application, the application making a system call to a library of a computer system for a resource, establishing a requesting thread. The method further includes the library sending a request message to a local security filter; the local security filter validating the requesting thread and returning a digital signature, that uniquely identifies the requesting thread, to the application. The application making a system call to a kernel of the computer system wherein the kernel uses the digital signature from the security filter to validate the requesting thread before allowing access to the requested resource.