R Beretta, NW Burns, N Begeman, PK Miller… - US Patent …, 2015 - Google Patents
A method and an apparatus that provide secure executable codes generated during run time via a trusted compiler server are described. An application can send a service request …
JR Rose - US Patent 10,564,943, 2020 - Google Patents
In one approach, a method comprises: a virtual machine receiving an invocation instruction from a caller that invokes a callee, wherein the caller represents a first set of instruc tions …
D Köhler, K Litsche, M Winkler - US Patent 8,607,224, 2013 - Google Patents
Nick,“J2ME/MIDP Programming for Mobile Phones Good, Bad and Ugly'. http://myhowto. org/java/23-2memidp-programming for-the-cell-phones..., 8 pages, printed on May 13, 2009 …
R Beretta, NW Burns, N Begeman, PK Miller… - US Patent …, 2018 - Google Patents
A method and an apparatus that instructs a compiler server to build or otherwise obtain a compiled code corresponding to a compilation request received from an application are …
J Vass - US Patent 9,407,959, 2016 - Google Patents
Methods, systems, and apparatus, including computer pro grams encoded on a computer storage medium, used to moni tor behavior with respect to a software program. In one …
DC Wrighton, RS Unoki - US Patent 7,673,109, 2010 - Google Patents
(56) References Cited Sensitive data structures, such as type data structures, can be US PATENT DOCUMENTS used by untrusted application programs without necessarily …
G Nagendra, S Taylor - US Patent 7,516,459, 2009 - Google Patents
Methods and apparatus to optimized managed application program interfaces are described herein. In an example method, a processor instruction proxy stub (PIPS) associated with one …
P Garyali, ZM Kaakani, VB Varma - US Patent 8,112,745, 2012 - Google Patents
(57) ABSTRACT A method includes identifying one or more features of an execution environment to be used by an application during execution and determining if use of the one …
D Massarenti, DR Thompson - US Patent 7,549,045, 2009 - Google Patents
(57) ABSTRACT A runtime execution environment may implement code access security by annotating a delegate to a publisher with a list of potential callers to the publisher. If a …