G06F9/44594

LOGICALLY SPLITTING OBJECT CODE INTO MODULES WITH LAZY LOADING OF CONTENT
20230044055 · 2023-02-09 ·

A method for receiving a first portion of object code, analyzing a first portion of object code in a static manner to determine a call tree hierarchy, dividing, by a synthetic compiler, the first portion of object code into a plurality of modules; and starting to run the first portion of object code to start a runtime phase, with the running of the first portion of the object code including: (i) lazy loading of the modules of the plurality of modules of the first portion of object code, and/or (ii) eager unloading of the modules of the plurality of modules of the first portion of object code.

Method and device for implementing password-free EMV contact transaction
11568387 · 2023-01-31 · ·

A method for realizing an EMV contact transaction without a password, wherein said method is implemented by an EMV IC card and a terminal, wherein when a terminal receives transaction information, it sets a password-free function setting; performs an offline data validation and limitation; performs terminal risk management and a behavior analysis; determines, on the basis of the password-free function setting, whether to perform online processing and performs transaction termination processing; the password-free function setting comprises: when an optional kernel configuration flag in an application parameter corresponding to the current application acquired is set and the transaction amount in the transaction information is greater than a password-free IC card transaction limitation amount, the current application is configured so that verifying the cardholder's PIN is obviated. The present invention allows password-free small-amount transactions, and obviates to upgrade IC cards.

Systems and methods for reducing forced application termination
11567784 · 2023-01-31 · ·

The disclosed computer-implemented method may include detecting an application running in a background state on a client device. The method may also include collecting state data about a current state of the client device. Additionally, the method may include determining, by applying a machine learning model to the collected state data, that a likelihood of forcible termination of the application within a predetermined timeframe exceeds a threshold. Furthermore, the method may include reducing a computing resource footprint of the application on the client device to reduce the likelihood of forcible termination of the application. Various other methods, systems, and computer-readable media are also disclosed.

VIRTUALIZATION LAYER ASSISTED UPGRADING OF IN-GUEST AGENTS

A system may include a host computer, a VCI running on the host computer, a virtualization layer executing in the host computer to support the VCI, and an in-guest agent executing in the VCI. The virtualization layer receives a message including metadata about a first memory region to be copied and an indication of loading of an upgraded version of the in-guest agent. Further, the virtualization layer copies data from the first memory region to a second memory region. Furthermore, the virtualization layer receives information about an entry point of the upgraded version from the in-guest agent. Also, the virtualization layer receives a request to register the entry point from the upgraded version and verifies the request based on the information about the entry point. Upon verifying the request, the virtualization layer enables the upgraded version to copy the data from the second memory region.

SYSTEM MANAGEMENT MODE RUNTIME RESILIENCY MANAGER
20230013235 · 2023-01-19 · ·

A system management mode (SMM) runtime resiliency manager (SRM) augments computing resource protection policies provided by an SMM policy shim The SMM shim protects system resources by deprivileging system management interrupt (SMI) handlers to a lower level of privilege (e.g., ring 3 privilege) and by configuring page tables and register bitmaps (e.g., I/O, MSR, and Save State register bitmaps). SRM capabilities include protecting the SMM shim, updating the SMM shim, protecting a computing system during SMM shim update, detecting SMM attacks, and recovering attacked or faulty SMM components.

APPLICATION LIFECYCLE MANAGEMENT BASED ON REAL-TIME RESOURCE USAGE
20230010567 · 2023-01-12 ·

Application lifecycle management based on real-time resource usage. A first plurality of resource values that quantify real-time computing resources used by a first instance of an application is determined at a first point in time. Based on the first plurality of resource values, one or more utilization values are stored in a profile that corresponds to the application. Subsequent to storing the one or more utilization values in the profile, it is determined that a second instance of the application is to be initiated. The profile is accessed, and the second instance of the application is caused to be initiated on a first computing device utilizing the one or more utilization values identified in the profile.

Computer-Based System for Locking User Account Access

A computing device may determine that a user of an application is asleep based on data of a wearable computing device that is associated with a user. Based on the determination that the user is asleep, the computing device may lock an account that is associated with the user. Locking the account may involve restricting actions that the user is permitted to take with respect to the application. The computing device may receive an indication of a first transaction that is associated with the account of the user. Based on the determination that the account is locked, the computing device may prohibit the transaction. The computing device may receive an indication that the user is awake. Based on the indication that the user is awake, the computing device may unlock the account and permit a second transaction.

Method for cleaning up background application, storage medium, and electronic device

A method for cleaning up a background application, a storage medium, and an electronic device are provided. The method includes the following. Collect multi-dimensional feature information associated with an application as samples to construct a sample set associated with the application. Extract feature information from the sample set to construct multiple training sets. Train each training set to generate a corresponding decision tree. Predict, with multiple decision trees generated, current feature information associated with the application and output multiple predicted results when the application is switched to the background, where the predicted results include predicted results indicative of that the application is able to be cleaned up and predicted results indicative of that the application is unable to be cleaned up. Determine whether the application is able to be cleaned up according to the multiple predicted results. Clean up the application when the application can be cleaned up.

Context framework
11537413 · 2022-12-27 · ·

The presentation of data models (a story) on a mobile device having limited memory and processing resources includes instantiating widgets one at a time for interaction with a user. When the user completes their interaction, the instance of that widget is removed from memory (destroyed); widgets are therefore stateless. A context framework that manages the application of filters to widgets that comprise the story. When a filter is applied, widget snapshot images used to display corresponding widgets in a collection view can be updated to reflect state changes of affected corresponding widgets so that users can see the state changes despite the widget being stateless.

Automatically managing performance of software in a distributed computing environment
11516096 · 2022-11-29 · ·

Software performance can be automatically managed in a distributed computing environment. In one example, a system that can receive metrics information describing resource usage by a first instance of a service in a distributed computing environment. The system can also determine a quality-of-service (QoS) constraint for the service. The system can then modify a definition file based on the metrics information and the QoS constraint, the definition file being configured for deploying instances of the service in the distributed computing environment. The system can deploy a second instance of the service in the distributed computing environment using the modified definition file. As a result, the second instance can more closely satisfy the QoS constraint than the first instance.