G06F9/44568

Technologies for position-independent persistent memory pointers

Technologies for persistent memory pointer access include a computing device having a persistent memory including one or more nonvolatile regions. The computing device may load a persistent memory pointer having a static region identifier, a segment identifier, and an offset from the persistent memory. The computing device may map the static region identifier to a dynamic region identifier and determine a virtual memory address of the persistent memory pointer target based on the dynamic region identifier, the segment identifier, and the offset. The computing device may load an in-storage representation of a persistent-export pointer from the persistent memory, map the in-storage representation to a runtime representation, and determine a target address of a persistent external data object based on the runtime representation. The computing device may include a compiler to generate output code including persistent memory pointer and/or persistent-export pointer accesses. Other embodiments are described and claimed.

CODE INSTRUMENTATION FOR RUNTIME APPLICATION SELF-PROTECTION
20180107821 · 2018-04-19 · ·

A method for runtime self-protection of an application program includes, before running the application program, identifying input and output points in runtime code (24) of the program. The input points are instrumented so as to cause the program to sense and cache potentially malicious inputs to the program. The output points are instrumented so as to cause the program to detect outputs from the program corresponding to the cached inputs. While running the application program, upon detecting, at an instrumented output point, an output corresponding to a cached input, a vulnerability of a target of the output to the cached input is evaluated. A protective action is invoked upon determining that the output is potentially vulnerable to the cached input.

TECHNOLOGIES FOR POSITION-INDEPENDENT PERSISTENT MEMORY POINTERS

Technologies for persistent memory pointer access include a computing device having a persistent memory including one or more nonvolatile regions. The computing device may load a persistent memory pointer having a static region identifier, a segment identifier, and an offset from the persistent memory. The computing device may map the static region identifier to a dynamic region identifier and determine a virtual memory address of the persistent memory pointer target based on the dynamic region identifier, the segment identifier, and the offset. The computing device may load an in-storage representation of a persistent-export pointer from the persistent memory, map the in-storage representation to a runtime representation, and determine a target address of a persistent external data object based on the runtime representation. The computing device may include a compiler to generate output code including persistent memory pointer and/or persistent-export pointer accesses. Other embodiments are described and claimed.

BARCODE READER THAT OBTAINS FIRMWARE FROM A REMOTE SERVER
20170324839 · 2017-11-09 ·

A barcode reader may include barcode reading hardware, which may include an image sensor. The image sensor may capture an image of a barcode within a field of view. The barcode reading hardware may also include a communication interface for output of decoded data to a remote computing system. The barcode reader may also include volatile memory and non-volatile memory. The non-volatile memory may include start-up instructions. The barcode reader may also include a processor. The processor may be configured to, upon power-up of the barcode reader, execute the start-up instructions to obtain firmware for operating the barcode reader from a remote configuration server, load the firmware to the volatile memory, and commence execution of the firmware to commence barcode reading functions of the barcode reader without performing a re-boot operation.

Host device for obtaining operating instructions for a barcode reader from a remote server

A host device is configured to (i) establish a point-to-point connection with a barcode reader via a point-to-point communication interface, (ii) determine that the barcode reader is in a state wherein executable instructions necessary for providing decoded data to the host device are not present within memory of the barcode reader, (iii) use the network interface to connect to a configuration server and to receive, from the configuration server, executable instructions required for the barcode reader to be capable of providing the decoded data to the host device, (iv) provide the executable instructions to the barcode reader via the point-to-point connection, and (v) receive from the barcode reader, via the point-to-point communication interface, the decoded data only after the executable instructions have been loaded to volatile memory of the barcode reader.

SYSTEM AND METHOD FOR PROTECTING PLAIN TEXT SCRIPTING LANGUAGE PROGRAMS IN A MAINFRAME REHOSTING PLATFORM
20170206363 · 2017-07-20 ·

In accordance with an embodiment, described herein is a system and method for protecting a scripting language application in a computing environment. An encryption-decryption module in the computing environment can use a native encryption-decryption library to encrypt the application. The encrypted application can be installed in an environment specific to a user of the computing environment. At runtime, the encryption-decryption module can use the native encryption-decryption library to decrypt the encrypted application into plain text statements, and store them into a memory buffer. The encryption-decryption module can further create a pipe, and fork a child process. The child process can call a scripting language engine, which can read the plain text statements from the memory buffer through the pipe, and execute the plain text statements. Once the execution is completed, the encryption-decryption module can be terminated, thereby clearing the data in the memory buffer.

APPLICATION RANDOMIZATION MECHANISM
20170177314 · 2017-06-22 ·

An example method includes generating, by a computing system, first unique configuration information, generating, by the computing system and based on the first unique configuration information, a first unique instance of a software component, generating second unique configuration information, wherein the second unique configuration information is different from the first unique configuration information, and generating, based on the second unique configuration information, a second unique instance of the software component that is executable on the runtime computing system. The first and second unique instances of the software component comprise different instances of the same software component that each are configured to have uniquely different operating characteristics during execution on the runtime computing system.

Adaptive application selection in cloud gaming
09675890 · 2017-06-13 · ·

Methods and systems for remotely provisioning immediately executable games with license control in secure environments. Immediately initially executable portions of games are pushed onto user desktops, and when games are selected for play, additional components of selected games are streamed to said desktops.

HOST DEVICE FOR OBTAINING OPERATING INSTRUCTIONS FOR A BARCODE READER FROM A REMOTE SERVER
20170118309 · 2017-04-27 ·

A host device is configured to (i) establish a point-to-point connection with a barcode reader via a point-to-point communication interface, (ii) determine that the barcode reader is in a state wherein executable instructions necessary for providing decoded data to the host device are not present within memory of the barcode reader, (iii) use the network interface to connect to a configuration server and to receive, from the configuration server, executable instructions required for the barcode reader to be capable of providing the decoded data to the host device, (iv) provide the executable instructions to the barcode reader via the point-to-point connection, and (v) receive from the barcode reader, via the point-to-point communication interface, the decoded data only after the executable instructions have been loaded to volatile memory of the barcode reader.

Host device for obtaining operating instructions for a barcode reader from a remote server

A host device is configured to (i) establish a point-to-point connection with a barcode reader via a point-to-point communication interface, (ii) determine that the barcode reader is in a state wherein executable instructions necessary for providing decoded data to the host device are not present within memory of the barcode reader, (iii) use the network interface to connect to a configuration server and to receive, from the configuration server, executable instructions required for the barcode reader to be capable of providing the decoded data to the host device, (iv) provide the executable instructions to the barcode reader via the point-to-point connection, and (v) receive from the barcode reader, via the point-to-point communication interface, the decoded data only after the executable instructions have been loaded to volatile memory of the barcode reader.