Loading applications in non-designated isolation environments

D Meketa - US Patent 8,146,084, 2012 - Google Patents
This specification describes technologies relating to execu tion of applications and the
management of an applications access to other applications. In general, a method can …

Methods and apparatuses for secure compilation

R Beretta, NW Burns, N Begeman, PK Miller… - US Patent …, 2015 - Google Patents
A method and an apparatus that provide secure executable codes generated during run
time via a trusted compiler server are described. An application can send a service request …

Special calling sequence for caller-sensitive methods

JR Rose - US Patent 10,564,943, 2020 - Google Patents
In one approach, a method comprises: a virtual machine receiving an invocation instruction
from a caller that invokes a callee, wherein the caller represents a first set of instruc tions …

System for packaging native program extensions together with virtual machine applications

D Köhler, K Litsche, M Winkler - US Patent 8,607,224, 2013 - Google Patents
Nick,“J2ME/MIDP Programming for Mobile Phones Good, Bad and Ugly'. http://myhowto.
org/java/23-2memidp-programming for-the-cell-phones..., 8 pages, printed on May 13, 2009 …

Methods and apparatuses for a compiler server

R Beretta, NW Burns, N Begeman, PK Miller… - US Patent …, 2018 - Google Patents
A method and an apparatus that instructs a compiler server to build or otherwise obtain a
compiled code corresponding to a compilation request received from an application are …

Monitoring behavior with respect to a software program

J Vass - US Patent 9,407,959, 2016 - Google Patents
Methods, systems, and apparatus, including computer pro grams encoded on a computer
storage medium, used to moni tor behavior with respect to a software program. In one …

Restricting type access to high-trust components

DC Wrighton, RS Unoki - US Patent 7,673,109, 2010 - Google Patents
(56) References Cited Sensitive data structures, such as type data structures, can be US
PATENT DOCUMENTS used by untrusted application programs without necessarily …

Methods and apparatus to optimize managed application program interfaces

G Nagendra, S Taylor - US Patent 7,516,459, 2009 - Google Patents
Methods and apparatus to optimized managed application program interfaces are described
herein. In an example method, a processor instruction proxy stub (PIPS) associated with one …

Apparatus and method for capabilities verification and restriction of managed applications in an execution environment

P Garyali, ZM Kaakani, VB Varma - US Patent 8,112,745, 2012 - Google Patents
(57) ABSTRACT A method includes identifying one or more features of an execution
environment to be used by an application during execution and determining if use of the one …

Delegate registration in a managed code execution environment

D Massarenti, DR Thompson - US Patent 7,549,045, 2009 - Google Patents
(57) ABSTRACT A runtime execution environment may implement code access security by
annotating a delegate to a publisher with a list of potential callers to the publisher. If a …