Abstract:
System and methods for securing inter-component communications in an operating system are provided. Systems and methods provided herein secure inter-component communications in an operating system by selectively generating instances when inter-component communication requests occur, whereby each of the generated instances are attached to a newly created blocked permissions list. System and methods further manage the invocation of Application Programming Interfaces by applications or instances in the operating system by determining whether the invocation of the Application Programming Interface is allowed or declined based on the blocked permissions list and default permission list associated with each invoking application or instance.
Abstract:
A method for performing an operation on a device resource includes: receiving a first request, which is requests an operation on a device resource, where a destination address of the first request is a mapped address of the device resource on a management apparatus; determining, that the device resource is created on a device corresponding to the device resource; generating a second request for performing an operation on the device resource on the device; and transmitting the second request to the device. A management apparatus for performing an operation on a device resource is also provided. By using the present invention, the complexity for the network application to perform an operation on the device resource can be reduced, and the convenience for the network application to perform an operation on the device resource can be improved. Therefore, extensive application of M2M can further be promoted.
Abstract:
A link detection technology. In a link detection method, when a target event occurs on paths, in a plurality of paths, whose quantity exceeds a preset quantity, whether the paths on which the target event occurs share a bottleneck link is detected, and congestion control is performed. It can be learned that in the technical solution provided in the embodiments of this application, the target event is a trigger, and shared bottleneck detection is performed after the quantity of the paths on which the target event occurs exceeds the preset quantity. This implements purposeful link detection, reduces system overheads, and brings a fast convergence speed.