METHOD AND APPARATUS FOR GENERATING EXECUTABLE FILE OR MULTI-INSTANCE SERVICE
    1.
    发明申请
    METHOD AND APPARATUS FOR GENERATING EXECUTABLE FILE OR MULTI-INSTANCE SERVICE 有权
    用于生成可执行文件或多个实例服务的方法和装置

    公开(公告)号:US20150040109A1

    公开(公告)日:2015-02-05

    申请号:US14341337

    申请日:2014-07-25

    CPC classification number: G06F9/44547 G06F8/54 G06F8/71 G06F9/454 H04M1/72519

    Abstract: The present invention relates to a method and an apparatus for generating an executable file of a multi-instance service. The method includes: performing compilation for a source file corresponding to a multi-instance service, to obtain a first-class object file, where the multi-instance service includes N instances, and N is a natural number greater than or equal to 2; performing an object copy of the first-class object file N−1 times, to obtain N−1 new first-class object files; and performing linking to the first-class object file and the N−1 new first-class object files, to generate an executable file. In the present invention, an executable file is generated by performing mirroring and linking processing for an object file obtained by compilation, thereby reducing a development cost and a maintenance cost of software source code.

    Abstract translation: 本发明涉及一种用于生成多实例服务的可执行文件的方法和装置。 该方法包括:对与多实例服务相对应的源文件执行编译,以获得第一类对象文件,其中多实例服务包含N个实例,N为大于或等于2的自然数; 执行第一类对象文件的对象副本N-1次,以获得N-1个新的一级对象文件; 并执行与第一类对象文件和N-1个新的第一类对象文件的链接,以生成可执行文件。 在本发明中,通过对通过编译获得的目标文件执行镜像和链接处理来生成可执行文件,从而降低了软件源代码的开发成本和维护成本。

    SECURITY ASSESSMENT APPARATUS AND METHOD FOR PROCESSOR

    公开(公告)号:US20230259636A1

    公开(公告)日:2023-08-17

    申请号:US18301238

    申请日:2023-04-16

    CPC classification number: G06F21/577 H04L63/1433

    Abstract: A security assessment apparatus and method for a processor are disclosed, and relate to the field of electronic technologies, to improve security during running of the processor. The security assessment apparatus includes: a processor (101), configured to run instructions in a memory (105); an access controller (103), configured to control a processor tracker (102) to access a first storage area in the memory (105), where the processor (101) is prohibited from accessing the first storage area; the processor tracker (102), configured to obtain first address information of a first instruction in the instructions in the memory (105), and store the first address information in the first storage area; and a security protection system (104), configured to obtain the first address information from the first storage area, and assess security of the first instruction based on the first address information.

    Apparatus and method for controlling running of multiple security software applications

    公开(公告)号:US10825014B2

    公开(公告)日:2020-11-03

    申请号:US16159095

    申请日:2018-10-12

    Inventor: Shilin Pan

    Abstract: An apparatus for controlling running of multiple security software applications, including: a secure element and at least one central processing unit coupled to the secure element, where the secure element includes a processor and a first random access memory; the processor is configured to: run secure operating system software and at least one security software application based on the secure operating system software; when it is required to run a second security software application, suspend running of a first security software application in the at least one security software application, control migrating first temporary data generated during running of the first security software application from the first random access memory to a storage device disposed outside the secure element, and based on the secure operating system software, run the second security software application.

    Executing sub-programs stored in an on-chip memory and charging a device via USB before enumeration process

    公开(公告)号:US09772857B2

    公开(公告)日:2017-09-26

    申请号:US14487618

    申请日:2014-09-16

    CPC classification number: G06F9/4406 G06F1/26

    Abstract: The present invention discloses a low-power startup method and a user equipment. The method includes: running, by a user equipment UE, a first subprogram in a boot load program bootloader, so as to determine whether the UE is charged through a universal serial bus interface USB; if the UE is charged through the USB and battery power is lower than a starting threshold, initializing, by the UE, the USB; when the USB successfully enumerates the UE, running, by the UE, a second subprogram in the bootloader to initialize an off-chip random memory in the UE; running, by the UE, a third subprogram in the bootloader to read a system mirror from an off-chip flash memory in the UE and load the system mirror to the off-chip random memory; and running, by the UE, the system mirror to complete a startup.

    LOW-POWER STARTUP METHOD AND USER EQUIPMENT
    7.
    发明申请
    LOW-POWER STARTUP METHOD AND USER EQUIPMENT 有权
    低功率启动方法和用户设备

    公开(公告)号:US20150082015A1

    公开(公告)日:2015-03-19

    申请号:US14487618

    申请日:2014-09-16

    CPC classification number: G06F9/4406 G06F1/26

    Abstract: The present invention discloses a low-power startup method and a user equipment. The method includes: running, by a user equipment UE, a first subprogram in a boot load program bootloader, so as to determine whether the UE is charged through a universal serial bus interface USB; if the UE is charged through the USB and battery power is lower than a starting threshold, initializing, by the UE, the USB; when the USB successfully enumerates the UE, running, by the UE, a second subprogram in the bootloader to initialize an off-chip random memory in the UE; running, by the UE, a third subprogram in the bootloader to read a system mirror from an off-chip flash memory in the UE and load the system mirror to the off-chip random memory; and running, by the UE, the system mirror to complete a startup.

    Abstract translation: 本发明公开了一种低功率启动方法和用户设备。 该方法包括:由用户设备UE运行引导加载程序引导加载程序中的第一子程序,以便确定UE是否通过通用串行总线接口USB进行充电; 如果UE通过USB充电并且电池电力低于起始阈值,则由UE初始化USB; 当USB成功地枚举UE时,由UE运行引导加载器中的第二子程序以初始化UE中的片外随机存储器; 由UE运行引导加载器中的第三子程序以从UE中的片外闪存读取系统镜像,并将系统镜像加载到片外随机存储器; 并由UE运行系统镜像来完成启动。

    Network Switching Method, Version Upgrade Method, and Terminal Device
    8.
    发明申请
    Network Switching Method, Version Upgrade Method, and Terminal Device 有权
    网络切换方法,版本升级方法和终端设备

    公开(公告)号:US20140325043A1

    公开(公告)日:2014-10-30

    申请号:US14261151

    申请日:2014-04-24

    CPC classification number: G06F8/65 H04L67/34

    Abstract: Embodiments of the present invention disclose a network switching method, a version upgrade method, and a terminal device, which relate to the field of communications technologies. A terminal receives a user instruction that instructs the terminal to access a network of a target operator. If an operator of a network currently accessed by the terminal is different from the target operator, a preset file is read to obtain image information corresponding to the target operator. A target image file corresponding to the target operator is obtained according to the image information and version switching is performed according to the target image file. The preset file includes image information that corresponds to all image files of operators stored in the terminal in one-to-one correspondence.

    Abstract translation: 本发明的实施例公开了与通信技术领域有关的网络交换方法,版本升级方法和终端设备。 终端接收指示终端访问目标运营商的网络的用户指令。 如果终端当前访问的网络的运营商与目标运营商不同,则读取预设文件以获得与目标运营商相对应的图像信息。 根据图像信息获得与目标操作者对应的目标图像文件,根据目标图像文件进行版本切换。 预设文件包括对应于存储在终端中的操作员的所有图像文件的一一对应的图像信息。

    INSECURE SOFTWARE DETECTION APPARATUS AND DETECTION METHOD, AND STORAGE MEDIUM

    公开(公告)号:US20230057717A1

    公开(公告)日:2023-02-23

    申请号:US18046147

    申请日:2022-10-12

    Abstract: An insecure software detection apparatus is provided, including: a dedicated processor (101), configured to: when a first analysis result indicates that to-be-detected software is not secure, analyze the to-be-detected software by using a first neural network model, to obtain a second analysis result, where the first analysis result is obtained by analyzing the to-be-detected software by using a second neural network model; and a general-purpose processor (102), configured to: obtain the second analysis result from the dedicated processor, and perform security processing on the to-be-detected software based on the second analysis result. The apparatus first analyzes the to-be-detected software by using the second neural network model with low power consumption. When an analysis result indicates that the to-be-detected software is not secure, the dedicated processor analyzes the to-be-detected software by using the first neural network model with a high computing capability.

    Secure Data Transfer Apparatus, System, And Method

    公开(公告)号:US20210152531A1

    公开(公告)日:2021-05-20

    申请号:US17158591

    申请日:2021-01-26

    Inventor: Shilin Pan

    Abstract: A secure data transfer apparatus, where a processor in the apparatus is configured to execute a driver software to generate cryptography information, a cryptography device in the apparatus is configured to obtain a current cryptography parameter based on the cryptography information, and perform a cryptography operation using the current cryptography parameter, a Peripheral Component Interconnect Express (PCIe) interface in the apparatus configured to perform a ciphertext data exchange with a memory controller in a memory located external to the apparatus, where the ciphertext data exchange includes sending the ciphertext data from the cryptography device to the memory controller when the memory is to be written, and sending the ciphertext data from the memory controller to the cryptography device when the memory is to be read.

Patent Agency Ranking