Patent classifications
G06F8/00
Master network techniques for a digital duplicate
Disclosed herein are techniques and tools for verifying data for semantic correctness and/or verifying data for network correctness. In one respect, a method includes receiving an input defining at least two master nodes and at least one master link, each master node having at least one or more respective data properties populated with master node data and the master link having at least one or more master link data, the master nodes and master link defining a master semantic network, importing source data into a second semantic network, comparing the source data to the master node data and making a first determination that the source data reflects a data relationship defined by the master node data, and based on the first determination, populating the source data into the second semantic network, wherein the source data populated within the second semantic network reflects the data relationship defined by the master node data and the master link data.
Systems and methods for controlling access to secure debugging and profiling features of a computer system
The present disclosure describes systems and methods for controlling access to secure debugging and profiling features of a computer system. Some illustrative embodiments include a system that includes a processor, and a memory coupled to the processor (the memory used to store information and an attribute associated with the stored information). At least one bit of the attribute determines a security level, selected from a plurality of security levels, of the stored information associated with the attribute. Asserting at least one other bit of the attribute enables exportation of the stored information from the computer system if the security level of the stored information is higher than at least one other security level of the plurality of security levels.
Systems and methods for controlling access to secure debugging and profiling features of a computer system
The present disclosure describes systems and methods for controlling access to secure debugging and profiling features of a computer system. Some illustrative embodiments include a system that includes a processor, and a memory coupled to the processor (the memory used to store information and an attribute associated with the stored information). At least one bit of the attribute determines a security level, selected from a plurality of security levels, of the stored information associated with the attribute. Asserting at least one other bit of the attribute enables exportation of the stored information from the computer system if the security level of the stored information is higher than at least one other security level of the plurality of security levels.
Processing system, update server and method for updating a processing system
According to various examples, a processing system is described comprising a plurality of hardware circuit components, each hardware circuit component configured to provide a processing functionality, a data path leading through the plurality of hardware circuit components, at least one programmable circuit and a controller configured to select one of the hardware circuit components to be replaced by the at least one programmable circuit, program the programmable circuit to provide the processing functionality provided by the selected hardware circuit component and configure the data path to lead through the programmable circuit instead of the selected hardware circuit component.
Processing system, update server and method for updating a processing system
According to various examples, a processing system is described comprising a plurality of hardware circuit components, each hardware circuit component configured to provide a processing functionality, a data path leading through the plurality of hardware circuit components, at least one programmable circuit and a controller configured to select one of the hardware circuit components to be replaced by the at least one programmable circuit, program the programmable circuit to provide the processing functionality provided by the selected hardware circuit component and configure the data path to lead through the programmable circuit instead of the selected hardware circuit component.
Method, system, and computer program product for dynamically ensuring SDK integrity
A method, system, and computer program product for dynamically ensuring SDK integrity load, at a merchant system, a software development kit (SDK) wrapper from a payment gateway system via a merchant webpage associated with the merchant system; execute the SDK wrapper, the SDK wrapper loading an SDK core when executed; determine an integrity of the SDK core; in response to determining the integrity of the SDK core, perform a handshake between the SDK wrapper and the SDK core and overload a real function exported by the SDK wrapper; and provide, from the merchant system via the SDK core, a secure payment container request to a payment gateway system.
Method, system, and computer program product for dynamically ensuring SDK integrity
A method, system, and computer program product for dynamically ensuring SDK integrity load, at a merchant system, a software development kit (SDK) wrapper from a payment gateway system via a merchant webpage associated with the merchant system; execute the SDK wrapper, the SDK wrapper loading an SDK core when executed; determine an integrity of the SDK core; in response to determining the integrity of the SDK core, perform a handshake between the SDK wrapper and the SDK core and overload a real function exported by the SDK wrapper; and provide, from the merchant system via the SDK core, a secure payment container request to a payment gateway system.
Pebbling strategies for quantum memory management
Quantum memory management is becoming a pressing problem, especially given the recent research effort to develop new and more complex quantum algorithms. The disclosed technology concerns various example memory management schemes for quantum computing. For example, certain embodiments concern methods for managing quantum memory based on reversible pebbling games constructed from SAT-encodings.
Method, System, and Computer Program Product for Dynamically Ensuring SDK Integrity
A method, system, and computer program product for dynamically ensuring SDK integrity load, at a merchant system, a software development kit (SDK) wrapper from a payment gateway system via a merchant webpage associated with the merchant system; execute the SDK wrapper, the SDK wrapper loading an SDK core when executed; determine an integrity of the SDK core; in response to determining the integrity of the SDK core, perform a handshake between the SDK wrapper and the SDK core and overload a real function exported by the SDK wrapper; and provide, from the merchant system via the SDK core, a secure payment container request to a payment gateway system.
Method, System, and Computer Program Product for Dynamically Ensuring SDK Integrity
A method, system, and computer program product for dynamically ensuring SDK integrity load, at a merchant system, a software development kit (SDK) wrapper from a payment gateway system via a merchant webpage associated with the merchant system; execute the SDK wrapper, the SDK wrapper loading an SDK core when executed; determine an integrity of the SDK core; in response to determining the integrity of the SDK core, perform a handshake between the SDK wrapper and the SDK core and overload a real function exported by the SDK wrapper; and provide, from the merchant system via the SDK core, a secure payment container request to a payment gateway system.