KR20080098010A - 컴퓨터 실행가능 컴포넌트들을 갖는 컴퓨터 판독가능 매체,및 메소드를 갖는 개체로 프로그램된 컴퓨터 시스템을동작시키는 프로세스 - Google Patents
컴퓨터 실행가능 컴포넌트들을 갖는 컴퓨터 판독가능 매체,및 메소드를 갖는 개체로 프로그램된 컴퓨터 시스템을동작시키는 프로세스 Download PDFInfo
- Publication number
- KR20080098010A KR20080098010A KR1020087018415A KR20087018415A KR20080098010A KR 20080098010 A KR20080098010 A KR 20080098010A KR 1020087018415 A KR1020087018415 A KR 1020087018415A KR 20087018415 A KR20087018415 A KR 20087018415A KR 20080098010 A KR20080098010 A KR 20080098010A
- Authority
- KR
- South Korea
- Prior art keywords
- entity
- call
- computer
- readable medium
- computer readable
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
- G06F15/163—Interprocessor communication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/468—Specific access rights for resources, e.g. using capability register
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Stored Programmes (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (20)
- 컴퓨터 실행가능 컴포넌트들을 갖는 컴퓨터 판독가능 매체에 있어서,a) 다수의 개체 - 각 개체는 하나의 메소드를 포함함-; 및b) 인터페이스 컴포넌트를 포함하고,상기 b) 인터페이스 컴포넌트는i) 다수의 개체 중의 임의의 개체 내의 호출된 메소드에 대한 호출을 수신하고;ii) 상기 호출의 수신에 응답하여 처리를 실행하며;iii) 상기 호출된 메소드를 호출하도록적응된 컴퓨터 판독가능 매체.
- 제1항에 있어서, 상기 다수의 개체의 각각은 ActiveX 개체를 포함하고, 상기 인터페이스 컴포넌트는 IDispatch 인터페이스를 구현하는 컴퓨터 판독가능 매체.
- 제1항에 있어서, 상기 인터페이스 컴포넌트는iv) 상기 호출된 메소드가 실행되어야 하는지 판정을 하고;v) 상기 판정에 응답하여 상기 호출된 메소드를 선택적으로 호출하도록더욱 적응되는 컴퓨터 판독가능 매체.
- 제3항에 있어서, 상기 호출된 메소드를 선택적으로 호출하는 것은 상기 호출된 메소드가 호출되지 않아야 한다는 것을 나타내는 판정에 응답하여 예외를 생성하는 것을 포함하는 컴퓨터 판독가능 매체.
- 제1항에 있어서,c) 호스트 컴포넌트; 및d) 운영 체제 컴포넌트를 더 포함하고,상기 인터페이스 컴포넌트는 상기 호스트 컴포넌트의 일부이고, 상기 다수의 개체의 최소한 일부는 운영 체제 컴포넌트를 액세스하는 컴퓨터 판독가능 매체.
- 제5항에 있어서, 상기 호스트 컴포넌트는 웹 브라우저이고, 상기 운영 체제 컴포넌트는 파일 관리 시스템을 포함하는 컴퓨터 판독가능 매체.
- 제6항에 있어서, 상기 인터페이스 컴포넌트는i) 상기 호출된 메소드가 신뢰할 수 없는 코드로부터 직접 또는 간접적으로 호출되었는지 판정하는 처리를 실행하고;ii) 상기 호출된 메소드가 신뢰할 수 없는 코드로부터 호출되었으면, 상기 호출된 메소드가 신뢰할 수 없는 코드에 의한 실행에 적합한 것으로 간주되었는지 판정하는 처리를 실행하며;iii) 상기 처리의 결과들에 기초하여 상기 호출된 메소드에 대한 호출을 선택적으로 허용하도록적응되는 컴퓨터 판독가능 매체.
- 메소드를 갖는 개체로 프로그램된 컴퓨터 시스템을 동작시키는 프로세스에 있어서,a) 메소드에 관한 정보를 개체와 관련시키는 단계;b) 상기 메소드에 대한 호출시에, 상기 정보를 참고하는 단계; 및c) 상기 정보에 기초하여 상기 호출을 선택적으로 처리하는 단계를 포함하는 컴퓨터 시스템 동작 프로세스.
- 제8항에 있어서,i) 상기 개체가 다수의 메소드를 갖고;ii) 정보를 상기 개체와 관련시키는 단계는 제1 시나리오에서 실행가능한 메소드들의 부분집합을 식별하는 단계를 포함하며;iii) 상기 호출을 선택적으로 처리하는 단계는 상기 메소드가 상기 부분집합 내에 있을 때 호출을 허용하는 단계를 포함하는 컴퓨터 시스템 동작 프로세스.
- 제9항에 있어서, 상기 호출을 선택적으로 처리하는 단계는 상기 메소드가 상 기 부분집합 내에 없을 때 예외를 생성하는 단계를 더 포함하는 컴퓨터 시스템 동작 프로세스.
- 제8항에 있어서,i) 상기 개체가 다수의 메소드를 갖고;ii) 정보를 상기 개체와 관련시키는 단계는 제1 시나리오에서 실행 불가능한 메소드들의 부분집합을 식별하는 단계를 포함하며;iii) 상기 호출을 선택적으로 처리하는 단계는 상기 메소드가 상기 부분집합 내에 없을 때 호출을 허용하는 단계를 포함하는 컴퓨터 시스템 동작 프로세스.
- 제8항에 있어서, 상기 호출을 선택적으로 처리하는 단계는 상기 메소드에 대한 제2 정보를 선택적으로 저장하는 단계를 포함하는 컴퓨터 시스템 동작 프로세스.
- 제12항에 있어서, 상기 메소드에 대한 제2 정보를 선택적으로 저장하는 단계는 상기 메소드의 예외 비용의 표시자(indicator)를 저장하는 단계를 포함하는 컴퓨터 시스템 동작 프로세스.
- 제12항에 있어서, 상기 메소드에 대한 제2 정보를 선택적으로 저장하는 단계는 상기 메소드가 실행되었다는 표시자를 저장하는 단계를 포함하는 컴퓨터 시스템 동작 프로세스.
- 제8항에 있어서,i) 상기 메소드가 반환 값을 생성하고;ii) 상기 호출을 선택적으로 처리하는 단계는 상기 반환 값을 위한 래퍼(wrapper)를 선택적으로 생성하는 단계를 포함하는 컴퓨터 시스템 동작 프로세스.
- 컴퓨터 판독가능 매체에 있어서,a) 제1 데이터 구조; 및b) 컴퓨터 실행가능 컴포넌트들이 저장되어 있는데,상기 a) 제1 데이터 구조는i) 제1 개체의 정의를 포함하는 최소한 하나의 필드; 및ii) 제2 개체의 정의를 포함하는 최소한 하나의 필드를 포함하고,상기 b) 컴퓨터 실행가능 컴포넌트들은i) 상기 제1 개체 정의로부터 인스턴스화된 제1 개체 - 상기 제1 개체는 상기 제2 개체의 정의로부터 제2 개체를 인스턴스화시키도록 적응된 컴퓨터 실행가능 명령어들과 관련됨-;ii) 상기 제2 개체 정의로부터 인스턴스화된 제2 개체; 및iii) A. 상기 제2 개체에 대한 호출을 수신하고;B. 상기 제2 개체에 대한 호출을 배치하며;C. 상기 제2 개체가 인스턴스화되었다는 동작 상태의 표시를 저장하도록 적응된 래퍼를 포함하는 컴퓨터 판독가능 매체.
- 제16항에 있어서, 상기 래퍼는 상기 제2 개체를 식별하는 호출을 수신하여 제2 개체 내의 메소드를 호출하도록 적응된 호출 컴포넌트를 포함하는 컴퓨터 판독가능 매체.
- 제17항에 있어서, 상기 제1 개체는 다수의 메소드를 포함하고,상기 컴퓨터 판독가능 매체는c) 보안 구역에서 동작가능한 상기 제1 개체 내의 메소드들을 식별하는 최소한 하나의 필드를 갖는 제2 데이터 구조를 더 포함하는 컴퓨터 판독가능 매체.
- 제17항에 있어서, 상기 호출 컴포넌트는 상기 호출이 상기 제2 데이터 구조 내에서 식별된 메소드에 대한 것일 때 상기 래퍼 상에 호출을 선택적으로 배치하도록 적응되는 컴퓨터 판독가능 매체.
- 제16항에 있어서,a) 상기 제2 개체는 보안 구역 내에서의 동작을 위한 동작 상태를 갖고;b) 상기 제2 개체는 상기 보안 구역 동작 상태에서 상기 제2 개체를 액세스하는 인터페이스를 가지며,c) 상기 래퍼는 상기 인터페이스를 통해 상기 제2 개체 상에 호출을 배치하도록 적응되는컴퓨터 판독가능 매체.
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/347,440 US7818798B2 (en) | 2006-02-03 | 2006-02-03 | Software system with controlled access to objects |
| US11/347,440 | 2006-02-03 | ||
| PCT/US2007/002671 WO2007092231A1 (en) | 2006-02-03 | 2007-01-30 | Software system with controlled access to objects |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| KR20080098010A true KR20080098010A (ko) | 2008-11-06 |
| KR101354743B1 KR101354743B1 (ko) | 2014-02-18 |
Family
ID=38345489
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| KR1020087018415A Expired - Fee Related KR101354743B1 (ko) | 2006-02-03 | 2007-01-30 | 컴퓨터 실행가능 컴포넌트들을 갖는 컴퓨터 판독가능 매체,및 메소드를 갖는 개체로 프로그램된 컴퓨터 시스템을동작시키는 프로세스 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US7818798B2 (ko) |
| EP (1) | EP1984843B1 (ko) |
| JP (2) | JP5108789B2 (ko) |
| KR (1) | KR101354743B1 (ko) |
| CN (1) | CN101379479B (ko) |
| WO (1) | WO2007092231A1 (ko) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR101029334B1 (ko) * | 2008-12-02 | 2011-04-13 | 한국전자통신연구원 | Api 로깅 장치 및 방법 |
Families Citing this family (92)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8078740B2 (en) | 2005-06-03 | 2011-12-13 | Microsoft Corporation | Running internet applications with low rights |
| US7945956B2 (en) * | 2006-05-18 | 2011-05-17 | Microsoft Corporation | Defining code by its functionality |
| US8185737B2 (en) | 2006-06-23 | 2012-05-22 | Microsoft Corporation | Communication across domains |
| US10019570B2 (en) | 2007-06-14 | 2018-07-10 | Microsoft Technology Licensing, Llc | Protection and communication abstractions for web browsers |
| US9906549B2 (en) * | 2007-09-06 | 2018-02-27 | Microsoft Technology Licensing, Llc | Proxy engine for custom handling of web content |
| US20090070663A1 (en) * | 2007-09-06 | 2009-03-12 | Microsoft Corporation | Proxy engine for custom handling of web content |
| JP2009205673A (ja) * | 2008-02-01 | 2009-09-10 | Canon Electronics Inc | 記憶装置、情報処理装置、端末装置およびコンピュータプログラム |
| US8522200B2 (en) | 2008-08-28 | 2013-08-27 | Microsoft Corporation | Detouring in scripting systems |
| US8914888B1 (en) * | 2009-10-21 | 2014-12-16 | Symantec Corporation | Systems and methods for classifying an unclassified process as a potential trusted process based on dependencies of the unclassified process |
| US9342274B2 (en) | 2011-05-19 | 2016-05-17 | Microsoft Technology Licensing, Llc | Dynamic code generation and memory management for component object model data constructs |
| US20130097660A1 (en) * | 2011-10-17 | 2013-04-18 | Mcafee, Inc. | System and method for whitelisting applications in a mobile network environment |
| CN103067343B (zh) * | 2011-10-21 | 2016-08-03 | 阿里巴巴集团控股有限公司 | 防止篡改ActiveX控件用途的方法和系统 |
| US9015682B1 (en) | 2012-03-28 | 2015-04-21 | Google Inc. | Computer code transformations to create synthetic global scopes |
| US9152784B2 (en) | 2012-04-18 | 2015-10-06 | Mcafee, Inc. | Detection and prevention of installation of malicious mobile applications |
| US20150205585A1 (en) * | 2012-06-04 | 2015-07-23 | Google Inc. | Delayed compiling of scripting language code |
| US9183210B2 (en) * | 2012-11-30 | 2015-11-10 | International Business Machines Corporation | Operating system control of directory events with dynamic program execution |
| US10218767B2 (en) * | 2012-12-25 | 2019-02-26 | Beijing Qihoo Technology Company Limited | Method, system and browser for executing active object of browser |
| US9430452B2 (en) | 2013-06-06 | 2016-08-30 | Microsoft Technology Licensing, Llc | Memory model for a layout engine and scripting engine |
| US9195704B2 (en) * | 2014-03-03 | 2015-11-24 | Sap Se | Automated logging for object-oriented environments |
| US10048974B1 (en) | 2014-09-30 | 2018-08-14 | Amazon Technologies, Inc. | Message-based computation request scheduling |
| US9715402B2 (en) | 2014-09-30 | 2017-07-25 | Amazon Technologies, Inc. | Dynamic code deployment and versioning |
| US9830193B1 (en) | 2014-09-30 | 2017-11-28 | Amazon Technologies, Inc. | Automatic management of low latency computational capacity |
| US9146764B1 (en) | 2014-09-30 | 2015-09-29 | Amazon Technologies, Inc. | Processing event messages for user requests to execute program code |
| US9323556B2 (en) | 2014-09-30 | 2016-04-26 | Amazon Technologies, Inc. | Programmatic event detection and message generation for requests to execute program code |
| US9678773B1 (en) | 2014-09-30 | 2017-06-13 | Amazon Technologies, Inc. | Low latency computational capacity provisioning |
| US9600312B2 (en) | 2014-09-30 | 2017-03-21 | Amazon Technologies, Inc. | Threading as a service |
| US9413626B2 (en) | 2014-12-05 | 2016-08-09 | Amazon Technologies, Inc. | Automatic management of resource sizing |
| US9733967B2 (en) | 2015-02-04 | 2017-08-15 | Amazon Technologies, Inc. | Security protocols for low latency execution of program code |
| US9588790B1 (en) | 2015-02-04 | 2017-03-07 | Amazon Technologies, Inc. | Stateful virtual compute system |
| US9785476B2 (en) | 2015-04-08 | 2017-10-10 | Amazon Technologies, Inc. | Endpoint management system and virtual compute system |
| US9930103B2 (en) | 2015-04-08 | 2018-03-27 | Amazon Technologies, Inc. | Endpoint management system providing an application programming interface proxy service |
| US10042735B2 (en) * | 2015-07-10 | 2018-08-07 | Ca, Inc. | Selecting application wrapper logic components for wrapping a mobile application based on wrapper performance feedback from user electronic devices |
| US9811434B1 (en) | 2015-12-16 | 2017-11-07 | Amazon Technologies, Inc. | Predictive management of on-demand code execution |
| US10754701B1 (en) | 2015-12-16 | 2020-08-25 | Amazon Technologies, Inc. | Executing user-defined code in response to determining that resources expected to be utilized comply with resource restrictions |
| US9910713B2 (en) | 2015-12-21 | 2018-03-06 | Amazon Technologies, Inc. | Code execution request routing |
| US10067801B1 (en) | 2015-12-21 | 2018-09-04 | Amazon Technologies, Inc. | Acquisition and maintenance of compute capacity |
| US11132213B1 (en) | 2016-03-30 | 2021-09-28 | Amazon Technologies, Inc. | Dependency-based process of pre-existing data sets at an on demand code execution environment |
| US10891145B2 (en) | 2016-03-30 | 2021-01-12 | Amazon Technologies, Inc. | Processing pre-existing data sets at an on demand code execution environment |
| US10102040B2 (en) | 2016-06-29 | 2018-10-16 | Amazon Technologies, Inc | Adjusting variable limit on concurrent code executions |
| US10884787B1 (en) | 2016-09-23 | 2021-01-05 | Amazon Technologies, Inc. | Execution guarantees in an on-demand network code execution system |
| US11119813B1 (en) | 2016-09-30 | 2021-09-14 | Amazon Technologies, Inc. | Mapreduce implementation using an on-demand network code execution system |
| US10564946B1 (en) | 2017-12-13 | 2020-02-18 | Amazon Technologies, Inc. | Dependency handling in an on-demand network code execution system |
| US10733085B1 (en) | 2018-02-05 | 2020-08-04 | Amazon Technologies, Inc. | Detecting impedance mismatches due to cross-service calls |
| US10831898B1 (en) * | 2018-02-05 | 2020-11-10 | Amazon Technologies, Inc. | Detecting privilege escalations in code including cross-service calls |
| US10353678B1 (en) * | 2018-02-05 | 2019-07-16 | Amazon Technologies, Inc. | Detecting code characteristic alterations due to cross-service calls |
| US10725752B1 (en) | 2018-02-13 | 2020-07-28 | Amazon Technologies, Inc. | Dependency handling in an on-demand network code execution system |
| US10776091B1 (en) | 2018-02-26 | 2020-09-15 | Amazon Technologies, Inc. | Logging endpoint in an on-demand code execution system |
| US10853115B2 (en) | 2018-06-25 | 2020-12-01 | Amazon Technologies, Inc. | Execution of auxiliary functions in an on-demand network code execution system |
| US10649749B1 (en) | 2018-06-26 | 2020-05-12 | Amazon Technologies, Inc. | Cross-environment application of tracing information for improved code execution |
| US11146569B1 (en) | 2018-06-28 | 2021-10-12 | Amazon Technologies, Inc. | Escalation-resistant secure network services using request-scoped authentication information |
| US10949237B2 (en) | 2018-06-29 | 2021-03-16 | Amazon Technologies, Inc. | Operating system customization in an on-demand network code execution system |
| US11099870B1 (en) | 2018-07-25 | 2021-08-24 | Amazon Technologies, Inc. | Reducing execution times in an on-demand network code execution system using saved machine states |
| US11243953B2 (en) | 2018-09-27 | 2022-02-08 | Amazon Technologies, Inc. | Mapreduce implementation in an on-demand network code execution system and stream data processing system |
| US11099917B2 (en) | 2018-09-27 | 2021-08-24 | Amazon Technologies, Inc. | Efficient state maintenance for execution environments in an on-demand code execution system |
| US11943093B1 (en) | 2018-11-20 | 2024-03-26 | Amazon Technologies, Inc. | Network connection recovery after virtual machine transition in an on-demand network code execution system |
| US10884812B2 (en) | 2018-12-13 | 2021-01-05 | Amazon Technologies, Inc. | Performance-based hardware emulation in an on-demand network code execution system |
| US11010188B1 (en) | 2019-02-05 | 2021-05-18 | Amazon Technologies, Inc. | Simulated data object storage using on-demand computation of data objects |
| US11861386B1 (en) | 2019-03-22 | 2024-01-02 | Amazon Technologies, Inc. | Application gateways in an on-demand network code execution system |
| US12327133B1 (en) | 2019-03-22 | 2025-06-10 | Amazon Technologies, Inc. | Application gateways in an on-demand network code execution system |
| US11119809B1 (en) | 2019-06-20 | 2021-09-14 | Amazon Technologies, Inc. | Virtualization-based transaction handling in an on-demand network code execution system |
| US11159528B2 (en) | 2019-06-28 | 2021-10-26 | Amazon Technologies, Inc. | Authentication to network-services using hosted authentication information |
| US11115404B2 (en) | 2019-06-28 | 2021-09-07 | Amazon Technologies, Inc. | Facilitating service connections in serverless code executions |
| US11190609B2 (en) | 2019-06-28 | 2021-11-30 | Amazon Technologies, Inc. | Connection pooling for scalable network services |
| US11106477B2 (en) | 2019-09-27 | 2021-08-31 | Amazon Technologies, Inc. | Execution of owner-specified code during input/output path to object storage service |
| US11250007B1 (en) | 2019-09-27 | 2022-02-15 | Amazon Technologies, Inc. | On-demand execution of object combination code in output path of object storage service |
| US11360948B2 (en) | 2019-09-27 | 2022-06-14 | Amazon Technologies, Inc. | Inserting owner-specified data processing pipelines into input/output path of object storage service |
| US11656892B1 (en) | 2019-09-27 | 2023-05-23 | Amazon Technologies, Inc. | Sequential execution of user-submitted code and native functions |
| US11263220B2 (en) | 2019-09-27 | 2022-03-01 | Amazon Technologies, Inc. | On-demand execution of object transformation code in output path of object storage service |
| US11394761B1 (en) | 2019-09-27 | 2022-07-19 | Amazon Technologies, Inc. | Execution of user-submitted code on a stream of data |
| US11023416B2 (en) | 2019-09-27 | 2021-06-01 | Amazon Technologies, Inc. | Data access control system for object storage service based on owner-defined code |
| US11386230B2 (en) | 2019-09-27 | 2022-07-12 | Amazon Technologies, Inc. | On-demand code obfuscation of data in input path of object storage service |
| US10908927B1 (en) | 2019-09-27 | 2021-02-02 | Amazon Technologies, Inc. | On-demand execution of object filter code in output path of object storage service |
| US11416628B2 (en) | 2019-09-27 | 2022-08-16 | Amazon Technologies, Inc. | User-specific data manipulation system for object storage service based on user-submitted code |
| US11055112B2 (en) | 2019-09-27 | 2021-07-06 | Amazon Technologies, Inc. | Inserting executions of owner-specified code into input/output path of object storage service |
| US11023311B2 (en) | 2019-09-27 | 2021-06-01 | Amazon Technologies, Inc. | On-demand code execution in input path of data uploaded to storage service in multiple data portions |
| US11550944B2 (en) | 2019-09-27 | 2023-01-10 | Amazon Technologies, Inc. | Code execution environment customization system for object storage service |
| US10996961B2 (en) | 2019-09-27 | 2021-05-04 | Amazon Technologies, Inc. | On-demand indexing of data in input path of object storage service |
| US10942795B1 (en) | 2019-11-27 | 2021-03-09 | Amazon Technologies, Inc. | Serverless call distribution to utilize reserved capacity without inhibiting scaling |
| US11119826B2 (en) | 2019-11-27 | 2021-09-14 | Amazon Technologies, Inc. | Serverless call distribution to implement spillover while avoiding cold starts |
| US11714682B1 (en) | 2020-03-03 | 2023-08-01 | Amazon Technologies, Inc. | Reclaiming computing resources in an on-demand code execution system |
| US11188391B1 (en) | 2020-03-11 | 2021-11-30 | Amazon Technologies, Inc. | Allocating resources to on-demand code executions under scarcity conditions |
| US11775640B1 (en) | 2020-03-30 | 2023-10-03 | Amazon Technologies, Inc. | Resource utilization-based malicious task detection in an on-demand code execution system |
| US12158958B2 (en) | 2020-08-27 | 2024-12-03 | Virsec Systems, Inc. | Web attack simulator |
| US11550713B1 (en) | 2020-11-25 | 2023-01-10 | Amazon Technologies, Inc. | Garbage collection in distributed systems using life cycled storage roots |
| US11593270B1 (en) | 2020-11-25 | 2023-02-28 | Amazon Technologies, Inc. | Fast distributed caching using erasure coded object parts |
| AU2021414145A1 (en) | 2020-12-31 | 2023-07-06 | Virsec Systems, Inc. | Automated detection of cross site scripting attacks |
| CA3219147A1 (en) * | 2021-05-18 | 2022-11-24 | Satya V. Gupta | Quantification of cyber risk in application workloads |
| US11388210B1 (en) | 2021-06-30 | 2022-07-12 | Amazon Technologies, Inc. | Streaming analytics using a serverless compute system |
| US11968280B1 (en) | 2021-11-24 | 2024-04-23 | Amazon Technologies, Inc. | Controlling ingestion of streaming data to serverless function executions |
| US12015603B2 (en) | 2021-12-10 | 2024-06-18 | Amazon Technologies, Inc. | Multi-tenant mode for serverless code execution |
| US12381878B1 (en) | 2023-06-27 | 2025-08-05 | Amazon Technologies, Inc. | Architecture for selective use of private paths between cloud services |
| US12476978B2 (en) | 2023-09-29 | 2025-11-18 | Amazon Technologies, Inc. | Management of computing services for applications composed of service virtual computing components |
Family Cites Families (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5515536A (en) * | 1992-11-13 | 1996-05-07 | Microsoft Corporation | Method and system for invoking methods of an object through a dispatching interface |
| US6182277B1 (en) | 1998-04-15 | 2001-01-30 | Oracle Corporation | Methods and apparatus for declarative programming techniques in an object oriented environment |
| US6438744B2 (en) | 1998-07-15 | 2002-08-20 | Microsoft Corporation | Dynamic mapping of component interfaces |
| US6587888B1 (en) | 1999-12-15 | 2003-07-01 | Networks Associates Technology, Inc. | Dynamic software wrapper |
| US6907546B1 (en) * | 2000-03-27 | 2005-06-14 | Accenture Llp | Language-driven interface for an automated testing framework |
| ATE412214T1 (de) * | 2000-06-16 | 2008-11-15 | Microsoft Corp | System und verfahren zur interaktiven kommunikation zwischen objekten in einer verteilten rechnerumgebung |
| US20040054696A1 (en) | 2002-09-13 | 2004-03-18 | Sheinis Joseph Igor | System and method for using proxies |
-
2006
- 2006-02-03 US US11/347,440 patent/US7818798B2/en active Active
-
2007
- 2007-01-30 EP EP07763071.3A patent/EP1984843B1/en not_active Not-in-force
- 2007-01-30 JP JP2008553330A patent/JP5108789B2/ja not_active Expired - Fee Related
- 2007-01-30 KR KR1020087018415A patent/KR101354743B1/ko not_active Expired - Fee Related
- 2007-01-30 WO PCT/US2007/002671 patent/WO2007092231A1/en not_active Ceased
- 2007-01-30 CN CN2007800042286A patent/CN101379479B/zh not_active Expired - Fee Related
-
2012
- 2012-08-30 JP JP2012190363A patent/JP5420734B2/ja not_active Expired - Fee Related
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR101029334B1 (ko) * | 2008-12-02 | 2011-04-13 | 한국전자통신연구원 | Api 로깅 장치 및 방법 |
Also Published As
| Publication number | Publication date |
|---|---|
| KR101354743B1 (ko) | 2014-02-18 |
| JP5108789B2 (ja) | 2012-12-26 |
| US7818798B2 (en) | 2010-10-19 |
| CN101379479B (zh) | 2013-03-06 |
| CN101379479A (zh) | 2009-03-04 |
| US20070199000A1 (en) | 2007-08-23 |
| EP1984843A1 (en) | 2008-10-29 |
| EP1984843A4 (en) | 2009-11-11 |
| JP2009525541A (ja) | 2009-07-09 |
| JP2012230724A (ja) | 2012-11-22 |
| JP5420734B2 (ja) | 2014-02-19 |
| EP1984843B1 (en) | 2018-11-14 |
| WO2007092231A1 (en) | 2007-08-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| KR101354743B1 (ko) | 컴퓨터 실행가능 컴포넌트들을 갖는 컴퓨터 판독가능 매체,및 메소드를 갖는 개체로 프로그램된 컴퓨터 시스템을동작시키는 프로세스 | |
| US11216256B2 (en) | Determining based on static compiler analysis that execution of compiler code would result in unacceptable program behavior | |
| Balzer et al. | Mediating connectors: A non-bypassable process wrapping technology | |
| US9449190B2 (en) | Method and system for run-time dynamic and interactive identification software authorization requirements and privileged code locations, and for validation of other software program analysis results | |
| US12524524B2 (en) | Intelligent obfuscation of mobile applications | |
| US7698713B2 (en) | Altered states of software component behavior | |
| US7757282B2 (en) | System and method for distinguishing safe and potentially unsafe data during runtime processing | |
| US20070011723A1 (en) | Method for maintaining application compatibility within an application isolation policy | |
| US20050172126A1 (en) | Security requirement determination | |
| US7076557B1 (en) | Applying a permission grant set to a call stack during runtime | |
| Clarke et al. | Saving the world from bad beans: deployment-time confinement checking | |
| Dean et al. | Java security: Web browsers and beyond | |
| Bank | Java security | |
| Kim et al. | {FuzzOrigin}: Detecting {UXSS} vulnerabilities in browsers through origin fuzzing | |
| Van Ginkel et al. | A Server‐Side JavaScript Security Architecture for Secure Integration of Third‐Party Libraries | |
| EP1693752B1 (en) | Method for controlling a process resource access via a parent process | |
| Lancia et al. | Java card virtual machine compromising from a bytecode verified applet | |
| Vanoverberghe et al. | A caller-side inline reference monitor for an object-oriented intermediate language | |
| US8375443B1 (en) | Code annotations for preventing access to unsafe functionality | |
| Bousquet et al. | Mandatory access control for the android dalvik virtual machine | |
| Pupo et al. | GUARDIA: specification and enforcement of javascript security policies without VM modifications | |
| US7861233B2 (en) | Transparent context switching for software code | |
| US8141037B2 (en) | Transparent context switching for software code | |
| Vanoverberghe et al. | Policy ignorant caller-side inline reference monitoring | |
| CN119046906A (zh) | 一种用户权限控制方法及装置 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PA0105 | International application |
St.27 status event code: A-0-1-A10-A15-nap-PA0105 |
|
| PG1501 | Laying open of application |
St.27 status event code: A-1-1-Q10-Q12-nap-PG1501 |
|
| R17-X000 | Change to representative recorded |
St.27 status event code: A-3-3-R10-R17-oth-X000 |
|
| A201 | Request for examination | ||
| E13-X000 | Pre-grant limitation requested |
St.27 status event code: A-2-3-E10-E13-lim-X000 |
|
| P11-X000 | Amendment of application requested |
St.27 status event code: A-2-2-P10-P11-nap-X000 |
|
| P13-X000 | Application amended |
St.27 status event code: A-2-2-P10-P13-nap-X000 |
|
| PA0201 | Request for examination |
St.27 status event code: A-1-2-D10-D11-exm-PA0201 |
|
| E902 | Notification of reason for refusal | ||
| PE0902 | Notice of grounds for rejection |
St.27 status event code: A-1-2-D10-D21-exm-PE0902 |
|
| P11-X000 | Amendment of application requested |
St.27 status event code: A-2-2-P10-P11-nap-X000 |
|
| P13-X000 | Application amended |
St.27 status event code: A-2-2-P10-P13-nap-X000 |
|
| E701 | Decision to grant or registration of patent right | ||
| PE0701 | Decision of registration |
St.27 status event code: A-1-2-D10-D22-exm-PE0701 |
|
| GRNT | Written decision to grant | ||
| PR0701 | Registration of establishment |
St.27 status event code: A-2-4-F10-F11-exm-PR0701 |
|
| PR1002 | Payment of registration fee |
St.27 status event code: A-2-2-U10-U12-oth-PR1002 Fee payment year number: 1 |
|
| PG1601 | Publication of registration |
St.27 status event code: A-4-4-Q10-Q13-nap-PG1601 |
|
| PN2301 | Change of applicant |
St.27 status event code: A-5-5-R10-R13-asn-PN2301 St.27 status event code: A-5-5-R10-R11-asn-PN2301 |
|
| PN2301 | Change of applicant |
St.27 status event code: A-5-5-R10-R11-asn-PN2301 |
|
| PN2301 | Change of applicant |
St.27 status event code: A-5-5-R10-R14-asn-PN2301 |
|
| FPAY | Annual fee payment |
Payment date: 20161220 Year of fee payment: 4 |
|
| PR1001 | Payment of annual fee |
St.27 status event code: A-4-4-U10-U11-oth-PR1001 Fee payment year number: 4 |
|
| FPAY | Annual fee payment |
Payment date: 20171219 Year of fee payment: 5 |
|
| PR1001 | Payment of annual fee |
St.27 status event code: A-4-4-U10-U11-oth-PR1001 Fee payment year number: 5 |
|
| R18-X000 | Changes to party contact information recorded |
St.27 status event code: A-5-5-R10-R18-oth-X000 |
|
| FPAY | Annual fee payment |
Payment date: 20181226 Year of fee payment: 6 |
|
| PR1001 | Payment of annual fee |
St.27 status event code: A-4-4-U10-U11-oth-PR1001 Fee payment year number: 6 |
|
| R17-X000 | Change to representative recorded |
St.27 status event code: A-5-5-R10-R17-oth-X000 |
|
| PR1001 | Payment of annual fee |
St.27 status event code: A-4-4-U10-U11-oth-PR1001 Fee payment year number: 7 |
|
| PR1001 | Payment of annual fee |
St.27 status event code: A-4-4-U10-U11-oth-PR1001 Fee payment year number: 8 |
|
| PR1001 | Payment of annual fee |
St.27 status event code: A-4-4-U10-U11-oth-PR1001 Fee payment year number: 9 |
|
| PR1001 | Payment of annual fee |
St.27 status event code: A-4-4-U10-U11-oth-PR1001 Fee payment year number: 10 |
|
| PR1001 | Payment of annual fee |
St.27 status event code: A-4-4-U10-U11-oth-PR1001 Fee payment year number: 11 |
|
| PC1903 | Unpaid annual fee |
St.27 status event code: A-4-4-U10-U13-oth-PC1903 Not in force date: 20250117 Payment event data comment text: Termination Category : DEFAULT_OF_REGISTRATION_FEE |
|
| H13 | Ip right lapsed |
Free format text: ST27 STATUS EVENT CODE: N-4-6-H10-H13-OTH-PC1903 (AS PROVIDED BY THE NATIONAL OFFICE); TERMINATION CATEGORY : DEFAULT_OF_REGISTRATION_FEE Effective date: 20250117 |
|
| PC1903 | Unpaid annual fee |
St.27 status event code: N-4-6-H10-H13-oth-PC1903 Ip right cessation event data comment text: Termination Category : DEFAULT_OF_REGISTRATION_FEE Not in force date: 20250117 |