G06F9/44589

DISTINGUISHED NEST-BASED ACCESS CONTROL

Techniques for determining and displaying error messages including a cause of an error generated because two types are not members of the same nest are disclosed. The system detects, at runtime, an instruction in a first type that attempts to access a private member of a second type. The system evaluates one or more nestmate criteria to determine whether the first type and the second type are within a same nest. A nest host corresponding to the nest specifies each nest member of the nest, and each nest member specifies an association with the nest. Responsive to determining that a particular nestmate criterion is not met, the system determines that the first type and the second type are not within the same nest and records or displays data identifying the particular nestmate criterion that has not been met, and throws an access error.

Method and System for Executing Applications Using Native Code Modules
20230024083 · 2023-01-26 ·

Some embodiments provide a system that executes a web application. During operation, the system loads the web application in a web browser and loads a native code module associated with the web application into a secure runtime environment. Next, the system provides input data associated with the web application to the native code module and processes the input data using the native code module to obtain output data. Finally, the system provides the output data to the web application for use by the web application.

Transitioning legacy software to be provably correct

A software development process may support a transition from unverifiable, legacy code to verifiable code that is provably correct by construction. A behavioral model may be developed for legacy software that includes various behavioral criteria. Then, source code implemented in a verifiable language may be verified using the behavioral model to perform verification. Once the source code is complete and verified, a new verified implementation may be compiled. The verified implementation may then be executed, along with the legacy software, to identify differences in behavior which are fed back into the behavioral model and subsequently into the new source code. This process may then be iterated with the verifiable code being deployable once behavioral differences are resolved.

Secure digital assistant integration in web pages

Secure digital assistant integration with web pages is provided. The system receives an intent manifest data structure that maps actions of a digital assistant with link templates of an electronic resource developed by a third-party developer device. The system validates the electronic resource based on the intent manifest data structure. The system receives, from a data exchange component of an iframe of the electronic resource loaded by a client computing device, an identifier of the client computing device. The system receives a foreground state of the electronic resource from an onsite state sharing API. The system selects a data value for a parameter based on the foreground state and the intent manifest data structure. The system provides the data value. An authorization component generates an authorization prompt, receives input, and transmits the data value to an onsite intent execution API of the electronic resource to execute an action.

SYSTEM AND METHOD FOR GENERATING MACHINE CODE FROM A MOCK APPLICATION
20230385179 · 2023-11-30 · ·

A system and method for generating a set of instructions for static analysis, for application code utilizing an external initialization engine. The method includes receiving a result from a code hook, the code hook inserted into an application code at an anchor point, the application code deployed in a cloud computing environment, wherein the application code requires an external initialization framework; and generating a set of instructions based on the received result and the anchor point of the application code, in response to emulating execution of the application code.

Distinguished nest-based access control

Techniques for determining and displaying error messages including a cause of an error generated because two types are not members of the same nest are disclosed. The system detects, at runtime, an instruction in a first type that attempts to access a private member of a second type. The system evaluates one or more nestmate criteria to determine whether the first type and the second type are within a same nest. A nest host corresponding to the nest specifies each nest member of the nest, and each nest member specifies an association with the nest. Responsive to determining that a particular nestmate criterion is not met, the system determines that the first type and the second type are not within the same nest and records or displays data identifying the particular nestmate criterion that has not been met, and throws an access error.

Container management system with a composite engine interface

Methods, systems, and computer storage media for providing a set of common flat files in a composite image that can be mounted as a container (i.e., composite container) to support isolation and interoperation of computing resources. Container management is provided for a container management system based on a composite image file system engine that executes composite operations to support resource isolation and operating system (OS) virtualization functionality. In particular, a container engine interface supports creating, mounting, and providing access to and from composite images or composite containers. In operation, a plurality of files for generating a composite image are accessed. The composite image for the plurality of files is generated. The composite image includes a set of common flat files. The composite image is communicated to cause mounting of the composite image, where mounting the composite image is based on a metadata file from the set of common flat files.

Operating method for performing firmware image chunk update and verification of whether damage as occurred on storage device

A controller is included in a storage device communicating with a host device. The controller is configured to receive a firmware image download command and a firmware image corresponding to the firmware image download command from the host device, perform verification for determining whether the firmware image is damaged in response to the received firmware image download command, and when a firmware update request for the firmware image is received from the host device, determine whether to perform a firmware update based on the firmware image by using a verification result of the firmware image.

Code protection
11550883 · 2023-01-10 · ·

A method includes receiving a request to execute bytecode that corresponds to secured program code, the secured program code including an encrypted version of the bytecode. Based on receiving the request to execute the bytecode, the method resolves the request, the resolving including identifying a location on disk of the secured program code. Based on resolving the request, a license file for decrypting the encrypted version of the bytecode for execution is accessed, the license file including an encrypted key-value. The encrypted key-value is used in decrypting the encrypted version of the bytecode to obtain decrypted bytecode, where the decrypting places the decrypted bytecode in working memory, and the decrypted bytecode is executed.

Systems and methods for preparing cross-platform machine learning applications

The technology disclosed relates to systems and methods of cross-platform programming of tiny machine learning (ML) applications. The method includes providing a first declarative instruction that, when processed, interacts with a cross-platform capability of tiny ML hardware. The method includes providing a second declarative instruction that, when processed, invokes at least one procedure block. The method includes providing a third declarative instruction that, when processed, causes output from the tiny ML hardware. The method includes compiling the ML procedure block and the tiny ML model into bytecode. The bytecode interacts, via a virtual machine (VM) layer, with the capability to produce the output responsive to the first, second and third declarative instructions. The method includes executing the bytecode on the tiny ML hardware to process the declarative instructions without recompilation of the bytecode to adapt to alternative instances of the tiny ML hardware, each running its alternative VM layer.