Resource permission processing method and apparatus, storage medium, and chip

    公开(公告)号:US11995451B2

    公开(公告)日:2024-05-28

    申请号:US17041942

    申请日:2018-03-27

    CPC classification number: G06F9/44505 G06F8/71 G06F9/5061 G06F16/90344

    Abstract: A resource permission processing method and apparatus, a storage medium, and a chip are disclosed, to update a resource label in a terminal device based on a first resource permission configuration file when a system software version in the terminal device is upgraded. The first resource permission configuration file covers only path information in which a label changes before and after the system software version is upgraded. Therefore, in a process of updating the resource label stored in the terminal device, a matching amount is greatly reduced when path information that matches traversal path information of a resource is searched for in the first resource permission configuration file, and therefore time consumed for labeling the stored resource can be reduced. The reduced time for labeling the stored resource improves labeling efficiency, reduces time consumed for the system software version upgrade, and improves efficiency of the system software version upgrade.

    Resource leak detection method, apparatus, and system

    公开(公告)号:US10289472B2

    公开(公告)日:2019-05-14

    申请号:US15441837

    申请日:2017-02-24

    Abstract: Embodiments of the present disclosure disclose a resource leak detection method, apparatus, and system that includes obtaining a target resource called when target code of a program runs, where the target code is partial code in program code, determining a first storage resource amount occupied by the target resource, determining whether the first storage resource amount occupied by the target resource satisfies a first preset condition, and if the first storage resource amount occupied by the target resource satisfies the first preset condition, determining a storage location of the target code as a resource leak location. In the embodiments of the present disclosure, the target code of the program can be tracked, and further, by means of detection, the storage location of the target code can be determined as the resource leak location.

    Kernel integrity protection method and apparatus

    公开(公告)号:US12032494B2

    公开(公告)日:2024-07-09

    申请号:US16965935

    申请日:2018-11-26

    Abstract: Embodiments of the present disclosure relate to kernel integrity protection methods and apparatuses. In an embodiment, a method includes: sending, by a first program executing at a first exception level, a request message to a second program executing at a second exception level, wherein the first exception level has lower execution privilege than the second exception level, the request message requests to perform memory access, and wherein the memory access is a preset register access or a preset memory space access, and; in response to receiving the request message, obtaining, by the second program, event information corresponding to the memory access; sending, by the second program, the event information to the first program; and processing, by the first program, the event information.

    Resource Leak Detection Method, Apparatus, and System

    公开(公告)号:US20170168886A1

    公开(公告)日:2017-06-15

    申请号:US15441837

    申请日:2017-02-24

    Abstract: Embodiments of the present disclosure disclose a resource leak detection method, apparatus, and system that includes obtaining a target resource called when target code of a program runs, where the target code is partial code in program code, determining a first storage resource amount occupied by the target resource, determining whether the first storage resource amount occupied by the target resource satisfies a first preset condition, and if the first storage resource amount occupied by the target resource satisfies the first preset condition, determining a storage location of the target code as a resource leak location. In the embodiments of the present disclosure, the target code of the program can be tracked, and further, by means of detection, the storage location of the target code can be determined as the resource leak location.

Patent Agency Ranking