摘要:
Tampering with pieces of software is inhibited. Hardware protection prevents hackers from forcing various pieces of software from running on unauthorized pieces of hardware. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. Image verification ensures the originality of the pieces of software to be installed.
摘要:
Tampering with pieces of software is inhibited. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. A process of verifying whether the pieces of software together constitute a software package that requires protection from tampering is also provided. Another process for determining whether the hardware resources, such as the central processing unit or the cache memory on a computing machine, belong to a class for which inhibiting software tampering is possible, is also provided.
摘要:
Tampering with pieces of software is inhibited. Profiles are stored in a central hierarchical database and such profiles are protected from tampering. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. A process of verifying whether the pieces of software together constitute a software package that requires protection from tampering is also provided.
摘要:
Tampering with pieces of software is inhibited. Hardware protection prevents hackers from forcing various pieces of software from running on unauthorized pieces of hardware. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. Image verification ensures the originality of the pieces of software to be installed.
摘要:
Tampering with pieces of software is inhibited. Profiles are stored in a central hierarchical database and such profiles are protected from tampering. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. A process of verifying whether the pieces of software together constitute a software package that requires protection from tampering is also provided.
摘要:
Tampering with pieces of software is inhibited. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. A process of verifying whether the pieces of software together constitute a software package that requires protection from tampering is also provided. Another process for determining whether the hardware resources, such as the central processing unit or the cache memory on a computing machine, belong to a class for which inhibiting software tampering is possible, is also provided.
摘要:
A system and method for independently configuring international location and language in a computer system generates composite locales for user-selected location and language combinations whenever a user-selected location and language combination is unsupported by default locales. The system includes a location format retrieval element for retrieving location-specific formatting data and a language format retrieval element for retrieving language-specific formatting data. A composite locale generator combines retrieved location-specific and language-specific data to generate a composite locale. In a preferred embodiment, a composite locale is generated from default locales. The location format retrieval element retrieves location-specific formatting data from a first default locale and the language format retrieval element retrieves language-specific formatting data from a second default locale. The composite locale is generated by combining the formatting data retrieved from the first and second default locales. In an alternative embodiment, a composite locale is generated from data retrieved from a location database and from a language database.
摘要:
A resource index on a computing device identifies multiple resource instances (e.g., multiple user interface (UI) resource instances) of multiple resource items (e.g., of multiple UI resource items), each resource instance having one or more resource instance conditions. In response to a request for a resource item received from an application, a determination is made based on the resource index of one of the multiple resource instances that satisfy conditions associated with the request, and the one of the multiple resource instances is returned to the application. Additionally, the resource index can be used to identify potential errors in running an application in various potential contexts.
摘要:
The present invention provides a decision engine and a content directory for use in identifying an appropriate instance of data to be used by an application. This process of localizing data is related to the need of providing contextually appropriate data to an end user. The application presents a request for an instance of the data to the decision engine. The decision engine accesses the content directory to determine the rules and attributes that govern the decision made by the decision engine. Depending on the rules and the attributes, the decision engine may require the application to supply certain values that are indicated by the rules and attributes. Based on these values, the decision engine is able to identify the contextually appropriate instance of the data for the application. The application is responsible for accessing the identified instance.
摘要:
Architecture that provides a unified interface to access resources in different formats and in disparate resource locations for a process (e.g., consuming application). The unified interface is extensible such that users can add additional components to the unified interface to provide access to new resources and new resource references. The interface provides the capability to create a single comprehensive index of all available resources regardless of the resource format. Format-specific indexers are provided for the resources to find, enumerate, and process the resources into a structure suitable for processing by an indexing component into the index. A user can introduce new format-specific indexers for new resources and new resource references for processing by the indexing component into the index. The unified interface now provides access to the new resources and new resources references as well.