Patent classifications
G06F9/44521
Software maintenance, distribution and loading
A method for content delivery to a user device, that helps to reduce bandwidth requirements and increases security of the content. The method includes receiving a download request from the user device, the download request including request data corresponding to characteristics of the user device, analyzing the request data to select a bootstrap module; transmitting the bootstrap module to the user device for download; analyzing an authentication characteristic to determine that the user device is authenticated for content viewing; transmitting a content catalogue to the user device; and upon receiving a user selection of a content item from the content catalogue, transmitting the user selected content item to the user device.
Method and system for application loading
The present invention discloses a method and system for application loading, the method comprising: receiving from the client a method tag request triggered on the basis of the tagging method of the application; retrieving the method tag in a method tag index store; obtaining, in response to the method tag being retrieved, a method content body corresponding to the method tag; and sending the method content body to the client. The present invention reduces the number of redundant codes to be loaded, thereby accelerating the application loading time.
Shadow stack enforcement range for dynamic code
Enforcing shadow stack violations for dynamic code. A thread is executed at a processor, which includes generating a portion of dynamic code for execution by the thread, identifying a range of memory addresses where the portion of dynamic code is loaded in memory, and initiating execution of the portion of dynamic code. Based at least on execution of the thread, an exception triggered by a mismatch between a first return address popped from a call stack corresponding to the thread and a second return address popped from a shadow stack corresponding to the thread is processed. Processing the exception includes (i) determining whether the second return address popped from the shadow stack is within the identified range of addresses, and (ii) based on having determined that the second return address is within the range of addresses, initiating a shadow stack enforcement action.
SYSTEM AND METHOD FOR CONTEXTUAL NAVIGATION IN APPLICATIONS
Methods and systems for providing contextual navigation on a software platform are described. A current context of a current page is determined, where the current page is for managing one or more aspects of a service instance on the software platform. The service instance is associated with a user account. It is determined, based on a historical activity pattern associated with the user account, that a particular web resource of an application is relevant to the current context. A contextual reference to the particular web resource is generated. The contextual reference is selectable to provide navigation to the particular web resource within the application. The contextual reference is displayed in the current page.
System Call Method and Apparatus, and Electronic Device
A system call method and apparatus, and an electronic device are provided. The method includes that: when a simulator runs on an operating system, a library file of the simulator and a pre-scanned system call table of the simulator are loaded, the system call table including a system file called by a simulation system in the simulator, and position information of the system file; a target system file associated with the library file is searched in the system call table; and the position information of the target system file is modified to a execution function corresponding to the simulator in the system call table, so as to call the target system file through the execution function.
System for simplifying executable instructions for optimised verifiable computation
The invention relates to distributed ledger technologies such as consensus-based blockchains. Computer-implemented N methods for reducing arithmetic circuits derived from smart contracts are described. The invention is implemented using a blockchain network, which may be, for example, a Bitcoin blockchain. A set of conditions encoded in a first programming language is obtained. The set of conditions is converted into a programmatic set of conditions encoded in a second programming language. The programmatic set of conditions is precompiled into precompiled program code. The precompiled program code is transformed into an arithmetic circuit. The arithmetic circuit is reduced to form a reduced arithmetic circuit, and the reduced arithmetic circuit is stored.
OFFLOAD SERVER, OFFLOAD CONTROL METHOD, AND OFFLOAD PROGRAM
An offload server includes: an application code analysis section configured to analyze a source code of an application and detect external library calls included in the source code as replacement sources; a replacement function detection section configured to retrieve libraries and IP cores from a code pattern database by using the detected external library calls as keys, as replacement-destination libraries/IP cores; and a replacement processing section configured to replace processing descriptions of the replacement sources with processing descriptions of the replacement-destination libraries/IP cores retrieved by the replacement function detection section and to generate interfaces of a CPU to the replacement-destination libraries/IP cores.
Extracting code patches from binary code for fuzz testing
A method, system and product for determining a characterization of a terminal within a binary code, based on influences of the terminal. Based on the characterization of the terminal, the terminal is determined to be potentially affected by external input that is inputted to a device executing the binary code. A propagation path that indicates a reachability of the terminal within the binary code is determined. A code patch associated with a functionality of at least a portion of the binary code and with the propagation path of the terminal is located in the binary code. The code patch can be executed independently from the binary code. The code patch is extracted from the binary code for testing, and an emulation of the code patch is generated to enable fuzz testing of the emulation, whereby the code patch is tested independently.
PROXY CALLBACK INTERFACE SUPPORTING MULTIPLE WEBHOOK CHANNELS
In an example, a proxy server includes a proxy callback interface supporting a plurality of webhook channels, each channel of the plurality of webhook channels being identified by a respective webhook channel address. The proxy callback interface receives a webhook call, the webhook call including a specific webhook channel address identifying a specific webhook channel, and payload callback data. The proxy server also includes a database interface to store a callback record that includes the payload callback data in a proxy server database. The proxy server also includes a query interface to receive a callback query, the callback query identifying the specific webhook channel address. The query interface further identifies a plurality of callback records, associated with the specific webhook channel address, that were stored within the proxy server database subsequent to receipt of a previously-received callback query, and returns the plurality of callback records, responsive to the callback query.
METHOD AND APPARATUS FOR DISPLAYING PAGE
A method and an apparatus for displaying a page. An exemplary method includes sending a dynamic configuration request of a tool display area in a target page in response to a page loading request of the target page in a live streaming scene. The method further includes receiving dynamic configuration information corresponding to the scene identification information, and displaying the target page based on the dynamic configuration information.