摘要:
A secure mobile wireless device in which executable code to be installed on the device is assigned a set of capabilities which define the protected resource(s) on the device which it can access. Hence, the present invention takes the idea of capabilities (known in the context of defining the capabilities or access privileges of different users in a multi-user system) and applies it to defining the capabilities or access privileges of different native executable code for secure, single-user mobile wireless devices.
摘要:
A secure mobile wireless device in which executable code to be installed on the device is assigned a set of capabilities which define the protected resource(s) on the device which it can access. Hence, the present invention takes the idea of capabilities (known in the context of defining the capabilities or access privileges of different users in a multi-user system) and applies it to defining the capabilities or access privileges of different native executable code for secure, single-user mobile wireless devices.
摘要:
A mobile wireless device programmed with software which provides a trusted user interface for the device by allowing the content of a secure screen memory to be modifiable only by authorised applications. Normally, the entire screen memory address is public information, making the entire screen memory fully available to any application; hence, even sensitive dialogs would use screen memory which can in theory be looked at by malicious software, enabling that malicious code to grab PIN data etc. or corrupt a trusted user interface. But with the present invention, unauthorised applications are prevented from accessing the data displayed by the secure frame buffer because they are able to access only the non-secure screen memory. Hence, malicious applications cannot retrieve data from a trusted dialog or compromise that data. Further, as the present invention is a software only solution, it requires no new hardware per se—the only requirement is that components (e.g. a software window server; a video chip etc.) can select content from different parts of screen memory—i.e. secure and non-secure frame buffers.
摘要:
Data held in physical memory, such as random access memory, in a computing device is defragmented when a system operating code null thread, which is used for placing the computing device into a reduced power mode when no other thread in the system is ready to run, is scheduled to run.
摘要:
A personality layer running above an operating system kernel puts any threads that the personality layer is responsible for into new states which the kernel does not know about. This prevents the kernel from performing operations on a thread which has been placed in one of these new states where these operations are sensitive to state of the thread itself (such as kill, suspend, change priority). Instead, the kernel redirects these thread operations to a handler in the personality layer which then handles the operation. The kernel is thus, in essence, extensible through the use of the added personality layers, and it can therefore be used to run legacy real-time applications written for other real-time operating systems.
摘要:
Methods, devices and computer program products automatically package an object in a covering material such as casing and/or netting by: (a) automatically pushing at least one object through a product chute; (b) pulling a covering material upstream of the product chute off an exterior surface of the product chute to automatically enclose the object in the covering material as the object exits the product chute; and (c) applying a clip to the covering material to secure the object in the packing material.
摘要:
Methods, devices and computer program products automatically or semi-automatically package an object in a covering material such as casing and/or netting by pulling a covering material upstream of a product chute off an exterior surface of the product chute to automatically enclose the object in the covering material as the object exits the product chute, then applying a clip to the covering material to secure the object in the covering material.
摘要:
Methods, devices and computer program products automatically package an object in a covering material such as casing and/or netting by: (a) automatically pushing at least one object through a product chute; (b) pulling a covering material upstream of the product chute off an exterior surface of the product chute to automatically enclose the object in the covering material as the object exits the product chute; and (c) applying a clip to the covering material to secure the object in the packing material.
摘要:
Apparatus and method for manipulating lightweight strips in parallel, laterally edge-adjacent array into spaced apart array for processing includes a platen having channels for receiving the strips, and a comb device for translating the strips of alternating channels to form two groups of laterally spaced strips. A pick-and-place conveyor has suction cups to remove each group in unison from the platen and place it on a belt conveyor. Suction holes in the channels selectively retain the groups on the platen. The comb, pick-and-place conveyor, and belt conveyor operate in synchrony and reiteratively to create a continuous stream of spaced apart strips.
摘要:
A component of a computing device, such as the kernel of an operating system, is arranged to identify real time processes running on the device and transparently lock the memory owned by such processes to avoid them being paged out. The kernel is also able to inspect all inter-process communications originated by the real time threads running in such processes, in order to ascertain what other processes they invoke, and, if they have the potential to block a real time operation, the kernel is arranged to lock the areas of memory these processes reference. This procedure operates recursively, and ensures that page faults which might affect the operation of any real time process do not occur.