Abstract: A system for detecting breach of merchant systems includes an extraction management system for extracting wildcard data from a dump site at which stolen account data is offered for sale. The system also includes an account breach identifying system for accessing stored transaction data from multiple banks and merging the extracted dump site data with the transaction data to create unique PAN (primary account number) data records (each set of wildcard data corresponds to only a single PAN) and multiple PAN data records (each set of wildcard data corresponds to multiple PANs). The unique and multiple PAN data records are stored and analyzed separately, and reduce the amount of data needed to identify a breached merchant.
Abstract: The described technology is directed towards an image providing service, including an image processing service that composites a base image into a resultant image, e.g., by resizing an image, overlaying text and so forth based upon a purpose for that image and/or a client device class; other parameters such as design information, protection and so forth also may be specified. When a client requests an image including by specifying a purpose and size in a request to an endpoint (e.g., URL) for an image, the image processing service locates or composites a resultant image corresponding to the request, and returns the resultant image or a modified (e.g., resized) resultant image in response to the request. Clients thus obtain images based upon a desired purpose without having to do client-side image processing including image compositing.
Type:
Grant
Filed:
June 8, 2020
Date of Patent:
August 2, 2022
Assignee:
HOME BOX OFFICE, INC.
Inventors:
Jack Song, Xinkai Wang, Gregory John Bellingham, Sata Busayarat, Brandon C. Furtwangler
Abstract: The method includes identifying, by one or more computer processors, a program being utilized by a user. The method further includes identifying, by one or more computer processors, an environmental factor related to a user of the program. The method further includes determining, by one or more computer processes, a relationship between the program and the environmental factor. The method further includes generating, by one or more computer processors, one or more instructions for the program based at least in part on the determined relationship and the environmental factor.
Type:
Grant
Filed:
October 9, 2019
Date of Patent:
July 26, 2022
Assignee:
International Business Machines Corporation
Inventors:
Jeremy R. Fox, Andrew R. Jones, Balasubramanian Sivasubramanian
Abstract: Systems and methods are disclosed for annotating a metadata catalog in a data intake and query system based on a detected change to the metadata catalog. The metadata catalog can store information about datasets associated with the data intake and query system, including dataset configuration records of the datasets, which can be used to process queries for execution by the data intake and query system. Based on a detected change to the metadata catalog, such as a manual or system annotation, the data intake and query system can generate additional annotations for the metadata catalog and use the annotations to update the metadata catalog.
Type:
Grant
Filed:
January 31, 2019
Date of Patent:
July 19, 2022
Assignee:
Splunk Inc.
Inventors:
Alexander Douglas James, Scott Calvert, Manu Jose, Andrew Peters, Christopher Madden Pride, Arun Ramani
Abstract: Techniques for a code reviewer service to provide recommendations on source code are described. A code reviewer service may run rules and/or machine learning models to provide the recommendations. A machine learning model may identify one or more predicted issues of source code, and the code reviewer service may provide one or more recommendations based at least in part on the one or more predicted issues. Code reviewer service may allow a pull request for a code repository to trigger the generation of recommendations for the source code in the repository. The recommendations may be posted on the pull request.
Abstract: Embodiments herein disclose systems, methods, and computer-readable media for automatically transforming a code base. Using the code base as input, the code base is parsed, analyzed, and a modified code base is automatically generated. The code base may be modified by changing one or more assets in the code base based on the identification of path-to-path dependencies and/or interactions, in various embodiments. In some embodiments, the identifiers for globally exposed assets in the code base are modified to add imports or exports.
Type:
Grant
Filed:
December 10, 2019
Date of Patent:
July 19, 2022
Assignee:
CERNER INNOVATION, INC.
Inventors:
William Arthur Reynolds, Joshua David Cox, Jonathan Richard Gold, Gyandeep Singh
Abstract: In one embodiment, the present disclosure pertains to automated data type determination of variables that are written in a programming language. In one embodiment, a programming language statement is received. The programming language statement includes a variable, an expression to which the variable is set, and a request to determine a data type of the variable. The expression is processed to deduce a data type of the expression. In certain embodiments, the data type of the expression is then assigned as the data type of the variable such that the data type can be used when the programming language statement is compiled into machine executable code.
Type:
Grant
Filed:
February 3, 2020
Date of Patent:
July 12, 2022
Assignee:
SAP SE
Inventors:
Chanho Jeong, Boyeong Jeon, Kiyoung Kim
Abstract: Systems, apparatuses and methods may provide for technology that detects one or more local variables in source code, wherein the local variable(s) lack dependencies across iterations of a loop in the source code, automatically generate pipeline execution code for the local variable(s), and incorporate the pipeline execution code into an output of a compiler. In one example, the pipeline execution code includes an initialization of a pool of buffer storage for the local variable(s).
Type:
Grant
Filed:
April 30, 2020
Date of Patent:
June 21, 2022
Assignee:
Intel Corporation
Inventors:
Rajiv Deodhar, Sergey Dmitriev, Daniel Woodworth, Rakesh Krishnaiyer, Kent Glossop, Arvind Sudarsanam
Abstract: A disclosed example to protect memory from buffer overflow or underflow includes defining an implicit bound pointer based on an implicit bound pointer definition in a configuration file for a memory region; instrumenting object code with an implicit buffer bound check based on the implicit bound pointer; and generating hardened executable object code based on the object code, the implicit buffer bound check, and the implicit bound pointer, the implicit bound pointer located in the hardened executable object code during a compilation phase to facilitate loading the implicit bound pointer in a global bounds table during runtime for access by the implicit buffer bound check.
Type:
Grant
Filed:
March 30, 2017
Date of Patent:
June 14, 2022
Assignee:
Intel Corporation
Inventors:
Junjing Shi, Qin Long, Liming Gao, Michael A. Rothman, Vincent J. Zimmer
Abstract: Systems and methods for supporting a compilation framework for hardware configuration generation. In one implementation, a processing device executing a compilation workflow for a target architecture may receive an input source code associated with a configuration for the target hardware architecture; identify a first configuration information associated with at least a portion of the configuration for the target hardware architecture; perform a first set of compilation passes of the input source code in view of the first configuration information; generate, in view of the first set of compilation passes of the input source code, a first internal representation component for the target hardware architecture; and generate, in view of the first internal representation component, a binary bitstream component for the target hardware architecture.
Abstract: Disclosed herein are techniques related to automated generation of regular expressions. In some embodiments, a regular expression generator may receive input data comprising one or more character sequences. The regular expression generator may convert character sequences into a sets of regular expression codes and/or span data structures. The regular expression generator may identify a longest common subsequence shared by the sets of regular expression codes and/or spans, and may generate a regular expression based upon the longest common subsequence.
Type:
Grant
Filed:
June 11, 2019
Date of Patent:
May 31, 2022
Assignee:
Oracle International Corporation
Inventors:
Michael Malak, Luis E. Rivas, Mark L. Kreider
Abstract: Run-time identification of dependencies during dynamic linking. A dynamic linker accesses contents of a first executable file that is to be executed. The dynamic linker, based on the contents of the first executable file, determines that the first executable file includes a first dynamic dependency function configured to be executed by the dynamic linker. The dynamic linker invokes the first dynamic dependency function of the first executable file. The dynamic linker receives, from the first dynamic dependency function, a first run-time dependency identifier that identifies a first run-time dependency, and adds the first run-time dependency identifier to a dependency identifier list.
Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for using reactive programming operators to implement resource pooling. One of the methods includes receiving a first request, from a client application, for a poolable object in a resource pool and maintained by a resource pool manager, wherein the request indicates an operation mode specifying how the resource pool manager should release the poolable object back into the resource pool; generating a plurality of reactive programming operators comprising a poolable object listener publisher and a subscriber that is configured to subscribe to the poolable object listener publisher; evaluating the reactive programming operators in an upstream subscription ordering of the reactive programming operators to obtain a poolable object from the resource pool; and releasing the poolable object back to the resource pool according to the operation mode of the request.
Type:
Grant
Filed:
April 5, 2019
Date of Patent:
May 24, 2022
Assignee:
Pivotal Software, Inc.
Inventors:
Stéphane Adrien Joseph Maldini, Joseph Benjamin Hale, Simon Baslé
Abstract: The present specification provides a method for executing a smart contract, a blockchain node, and a storage medium. An implementation of a method for executing a smart contract includes: receiving, by a blockchain node, a request for creating a smart contract, the request including a bytecode of the smart contract; starting, by the blockchain node after completing deployment of the smart contract, to compile the bytecode of the smart contract into a machine code by using ahead of time (AoT) compilation and storing the machine code; and during execution of a smart contract that has been deployed, interpreting and executing, by the blockchain node, a bytecode of the smart contract in response to that a machine code of the smart contract is not locally stored.
Type:
Grant
Filed:
June 18, 2021
Date of Patent:
May 10, 2022
Assignee:
Alipay (Hangzhou) Information Technology Co., Ltd.
Abstract: A method and system for coordinating continuous delivery pipeline testing against a singleton instance of an application is disclosed. The method may include identifying a set of unchanged components across a preceding build and a current build of the singleton instance, and identifying a first set of test cases from a plurality of test cases executed on at least one unchanged component. The method may further include performing execution of a second set of test cases on the remaining set of unchanged components in the current build, and performing execution of each of the plurality of test cases on at least one changed component in the current build. The method may further include reporting test results of executing the first set of test cases on the at least one unchanged component, the second set of test cases, and the plurality of test cases.
Type:
Grant
Filed:
June 20, 2020
Date of Patent:
April 26, 2022
Assignee:
HCL America Inc.
Inventors:
Michael Hudson, Bahram Sanaei, Asiyah Ahmad
Abstract: A method and apparatus are disclosed for upgrading libraries in a source code program by evaluating libraries in the source code program for predetermined selection criteria specifying library performance limitations to identify at least a first library which does not meet the plurality of predetermined selection criteria and then identifying a first alternative library that is suitable for substitution for the first library so that the source code program may be automatically modified to replace the first library with the first alternative library, thereby generating a modified source code program having an upgraded library functionality.
Abstract: Techniques and solutions are described for automatically refactoring code. In particular, disclosed technologies provide for automatically refactoring code that includes function calls, which can be to particular types of functions, such as external functions or functions that are not member functions of a class. For code to be refactored, an interface and a class are created. The class implements the interface. Method declarations corresponding to the function calls being refactored are added to the interface and the class. Code is added instantiating an object of the class. Implementations for the methods in the class can call the functions called by the source code being refactored, or can include code implementing the functionality of the called functions. Refactored code has function calls replaced with calls to corresponding methods of the interface.
Abstract: An application development environment providing system which provides a development environment for an application program via a network, wherein the network includes a first network which accommodates at least one device and which is communicatively connected to the device, and a second network communicatively connected to the first network, and wherein the application development environment providing system includes a program developer configured to classify processes included in the application program into a process executed in the first network and a process executed in the second network based on a predetermined determination condition, and to generate a first program execution file executed in the first network and a second program execution file executed in the second network in cooperation with the first program execution file.
Abstract: Mechanisms and techniques for providing continuous integration and continuous deployment (CI/CD) for data lake applications are disclosed. Assembly of code for an app is managed with a CI platform to create a container within a shared environment within which the app runs. The container is isolated from other containers and bundles software, libraries and configuration files and can communicate with other containers through defined channels. The shared environment provides a platform for running the app. The app writes to one or more tables maintained in the shared environment. Assembly of subsequent versions of code for the app is managed by the CI platform. Deployment of the assembled subsequent version of the code to the container is managed by the CI platform. Integration tests are run on the deployed subsequent version of the code with the CI platform. The subsequent version of the code replaces the app in the shared environment when integration testing is complete.
Abstract: Systems and methods for quality analysis of a source code are disclosed. The method includes obtaining plural comments included in the source code. Each of the plural comments includes at least one of plural predetermined words. Also the method extracts plural candidate comments which are comments obtained by excluding plural specific comments from the obtained plural comments. Each of the plural specific comments can be identified using a similarity between a source code fragment relating to any of the obtained plural comments and an adjacent source code fragment adjacent to the source code fragment. In addition, the method outputs an evaluation about incompletion of the source code. The evaluation is determined using the plural candidate comments.
Type:
Grant
Filed:
April 23, 2020
Date of Patent:
March 8, 2022
Assignee:
International Business Machines Corporation
Abstract: An event-driven compute service upgrades an execution environment for registered functions of the compute service. Some compute nodes of the service have an updated version of the execution environment and some compute nodes have the old version of the execution environment. As a part of the upgrade process, some functions are executed in both environments. For example, for some invocations of a particular function, the function is executed in the updated execution environment while for other invocations of the same function, the function is executed in the old execution environment. Based on resulting status of the executions, the compute service determines that the particular function is compatible or incompatible with the updated version of the execution environment. The compute service performs subsequent executions of incompatible functions in the old version of the execution environment instead of in the updated version. A client may be notified of the incompatibility.
Abstract: Described herein are techniques for executing a heterogeneous code object executable. According to the techniques, a loader identifies a first memory appropriate for loading a first architecture-specific portion of the heterogeneous code object executable, wherein the first architecture specific portion includes instructions for a first architecture, identifies a second memory appropriate for loading a second architecture-specific portion of the heterogeneous code object executable, wherein the second architecture specific portion includes instructions for a second architecture that is different than the first architecture, loads the first architecture-specific portion into the first memory and the second architecture-specific portion into the second memory, and performs relocations on the first architecture-specific portion and on the second architecture-specific portion.
Type:
Grant
Filed:
November 22, 2019
Date of Patent:
February 22, 2022
Assignee:
Advanced Micro Devices, Inc.
Inventors:
Steven Tony Tye, Brian Laird Sumner, Konstantin Zhuravlyov
Abstract: Modular co-versioning may involve the creation of multi-version libraries that may include multiple versions of a class. A multi-version library may include a base version and one or more other versions each of which may correspond to a particular, respective version of a software development kit, runtime environment or software platform, according to various embodiments. At runtime, a multi-version library may be searched in order to load a version of a class that corresponds to the version of the currently executing runtime environment. If the multi-version library does not include a version of the class corresponding to the currently executing version of the environment/platform, a version of the class corresponding to a previous version of the environment may be loaded if found in the multi-version library. Alternatively, if no other version of the class is found, a base version of the class may be loaded from the multi-version library.
Abstract: Examples of the present disclosure provide apparatuses and methods for target architecture determination. An example method comprises receiving an indication of a type of target architecture in a portion of source code and creating compiled code for the type of target architecture based on the indication.
Abstract: A function is compiled against a first application binary interface (ABI) and a second ABI of a native first instruction set architecture (ISA). The second ABI defines context data not exceeding a size expected by a third ABI of a foreign second ISA, and uses a subset of registers of the first ISA that are mapped to registers of the second ISA. Use of the subset of registers by the second ABI results in some functions being foldable when compiled using both the first and second ABIs. First and second compiled versions of the function are identified as foldable, or not, based on whether the compiled versions match. Both the first and second compiled versions are emitted into a binary file when they are not foldable, and only one of the first or second compiled versions is emitted into the binary file when they are foldable.
Type:
Grant
Filed:
August 31, 2020
Date of Patent:
January 25, 2022
Assignee:
MICROSOFT TECHNOLOGLY LICENSING, LLC
Inventors:
Pedro Miguel Sequeira De Justo Teixeira, Darek Josip Mihocka, Jon Robert Berry, Russell Charles Hadley, James David Cleary, Clarence Siu Yeen Dang
Abstract: A system and method to automatically generate a software service to provide service layer functionalities to legacy computing systems that are inherently incompatible with a Service Oriented Architecture (SOA) consumer environment. A configuration specification defining the characteristics of the software service, including data mapping rules is received. Based on the specification, at least one pattern template for the software service is selected from a library of templates. The pattern templates provide source code patterns usable to build the software service. Source code of the software service is outputted using programming code provided in the at least one design pattern template. The outputted source code is packaged or assembled into a source code package for deployment.
Abstract: A method and apparatus are disclosed for enhancing operable functionality of input source code files from a software program by preprocessing input source code files with codeword processing operations to generate a plurality of preprocessed input source code files, identifying candidate code snippets by pruning one or more preprocessed input source code files that do not meet a similarity threshold measure for library functions stored in the system library, and identifying at least a first validated code snippet from the one or more candidate code snippets that matches a first library function stored in the system memory on the basis of at least first and second matching metrics.
Abstract: Systems, methods, and computer storage media are disclosed. A computer storage medium includes instructions that, when executed, perform actions including maintaining a first view based on a first table of a database. The actions include performing a first transaction within the database. The actions include performing a second transaction within the database, and the second transaction relies on data from the first view. Performing the second transaction includes beginning the second transaction. In response to occurrence of both (i) the first transaction committing a first modification to the first table subsequent to the beginning of the second transaction and (ii) the second transaction causing a modification to the first view based on the first modification, performing the second transaction includes continuing the second transaction based on the data from the first view excluding the modification to the first view and completing the second transaction.
Abstract: A method including obtaining preset environment data by a client terminal of a mobile group office platform; and performing, by the client terminal, collaborative processing on a preset office event according to the preset environment data. According to the technical solutions of the present disclosure, collaborative processing is actively performed on the preset office event based on changes to environment data, thereby improving the processing efficiency of office events.
Abstract: The described technology is generally directed towards causing the generation of a content selection graph (or set of graphs) upon receipt of a notification that a new graph or replacement graph is needed with respect to a starting timepoint. For a new graph, a timepoint for that new graph indicates the need for the new graph at a given starting time. For a replacement graph, a notification (subscribed from a monitoring service) can indicate that an existing graph has changed; a replacement graph is generated with a graph identifier of the replacement graph, which then replaces the graph identifier of the existing graph in the mappings of valid graphs to start times. A Redis cache can be used to maintain the various graph sets, including the active graph sets and graph sets that will become active at a future time.
Type:
Grant
Filed:
December 19, 2019
Date of Patent:
December 21, 2021
Assignee:
Home Box Office, Inc.
Inventors:
Jonathan David Lutz, Allen Arthur Gay, Dylan Carney
Abstract: Embodiments for processing language by one or more processors are described. A plurality of document portions are detected. Each of the plurality of document portions includes text in a respective language type. The text of each of the plurality of document portions is converted to a standardized language type. A language processing method is caused to be performed on the plurality of document portions after the converting of the text of each of the plurality of document portions to the standardized language type.
Type:
Grant
Filed:
October 11, 2018
Date of Patent:
December 14, 2021
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventors:
Thomas J. Fleischman, Emily R. Kinser, John E. Drummond, Wayne M. Delia, Sue Hallen
Abstract: Systems and methods for improving builds of software applications are described herein. In an embodiment, an ontology comprises one or more translation cells comprising context data and software code and a plurality of pearl schema nodes, each of which defining one or more attributes in the ontology. When input data is received at a translation cell, context data in the translation cell is used to translate the input data into canonical data. Context data is then used to translate the canonical data into output data which can be provided to a client computing device.
Abstract: A computer includes a memory and a processor programmed to execute instructions stored in the memory. The instructions include identifying a function in a binary file, assigning one of a plurality of classifications to the function, and determining that the function requires stack cookie protection based at least in part on the classification assigned to the function.
Type:
Grant
Filed:
September 12, 2018
Date of Patent:
October 26, 2021
Assignee:
Blackberry Limited
Inventors:
Adam John Boulton, Benjamin John Godwood
Abstract: An electronic control device includes: a partially reconfigurable logic circuit in which a calculation unit which is reconfigured and executes calculation and a storage unit which stores calculation target date to be calculated by the calculation unit is configured; and a processing control unit which transmits circuit data for reconfiguring the calculation unit and the calculation target date to the logic circuit. When the processing control unit obtains next calculation target data which is the calculation target date relating to a next calculation unit which is the calculation unit after completion of reconfiguration, transmission of the next calculation target date to the storage unit is started regardless of whether the reconfiguration of the next calculation unit is completed, and upon completion of the reconfiguration, the next calculation unit performs calculation using the next calculation target date.
Abstract: Systems and methods for executing compiled code having parallel code fragments is provided. One method includes storing executable code having a plurality of parallel code fragments, each of the plurality of parallel code fragments representing alternative executable paths through a code stream. The method further includes determining a code level supported by a processor executable at a computing system, the processor executable supporting a hosted computing environment. The method also includes translating the executable code into machine-readable code executable by a processor of the computing system. Translating the executable code includes selecting a code fragment from among the plurality of parallel code fragments for execution based on the code level supported by the processor executable. The method includes executing the machine-readable code within the hosted computing environment.
Type:
Grant
Filed:
October 5, 2020
Date of Patent:
September 21, 2021
Assignee:
Unisys Corporation
Inventors:
Matthew Miller, David Strong, Anthony Matyok
Abstract: A method for performing an operation on a flight sensor parameter includes receiving instructions indicating a description of a flight sensor parameter and an operation to be performed on the flight sensor parameter. The method includes generating executable code based on the instructions indicating the description and the operation. The method includes, after generating the executable code, associating the executable code with flight sensor data from one or more sensors. The flight sensor parameter includes a variable of the flight sensor data. The method further includes executing the executable code at a processor using the flight sensor data as an input to generate an output that indicates results of the operation.
Type:
Grant
Filed:
January 15, 2019
Date of Patent:
September 14, 2021
Assignee:
THE BOEING COMPANY
Inventors:
Changzhou Wang, Jun Yuan, Darren Puigh, Greg Jackson
Abstract: An electronic device and method that are robust against attacks on encryption-related vulnerabilities as detection of an encryption algorithm based on if artificial intelligence technology is enabled are provided. A security enhancement method includes a hooking loading of an executable code into a memory, inputting the executable code into an encryption code identification model that is based on an artificial neural network, determining, by the encryption code identification model, whether the loading of the executable code into the memory is allowed, and when the loading of the executable code is not allowed, blocking the loading of the executable code into the memory.
Abstract: A method includes determining to share access to a directory between a first web services account and a second web services account that lacks access to the directory, wherein the directory is managed by a directory service that executes within a first on-demand configurable pool of shared computing resources, and wherein the second web services account is associated with a second on-demand configurable pool of shared computing resources. The method includes generating a virtual directory for the second web services account, wherein the virtual directory comprises one or more virtual resources that are representations of resources on the directory, and wherein the virtual directory further comprises a reference to the directory. The method further includes receiving an access request to the directory from the second web services account, wherein the access request is received via the reference from the virtual directory to the directory, and then granting the access request.
Type:
Grant
Filed:
September 28, 2018
Date of Patent:
August 24, 2021
Assignee:
Amazon Technologies, Inc.
Inventors:
Dinesh Ramesh Kukreja, Keith Littleton Croney, Peter Lopes Pereira
Abstract: Devices and methods are provided for providing software developer-driven analysis for the expected impact that a proposed software modification may have on software programs and devices. A device may receive files including a first file including indications of: (i) a feature modified by one or more software modifications, (ii) a sub-feature associated with the feature and modified by the one or more software modifications, and (iii) first information associated with the feature, and a second file including indications of: (i) the feature, (ii) the sub-feature, and (iii) second information associated with the feature. The device may determine a record including indications of: (i) the feature, (ii) the sub-feature, (iii) the first information, and (iv) the second information. The device may determine a test plan including one or more tests performed based on the record. The device may execute at least a portion of the test plan.
Abstract: The analysis technique presenting system includes: a storage apparatus storing a plurality of analysis modules that are divided from the analysis processing into a plurality of steps, a plurality of analysis techniques that combine some of the analysis modules, analysis module information that associates the analysis module with the corresponding model of the mechanism, and analysis technique information that associates a list of the analysis modules belonging to the corresponding analysis technique with the model; an identifying unit identifies, when the analysis technique associated with an input model input is not present in the analysis technique information, the analysis module matching the input model from the analysis module information; a replacing unit replaces the analysis module, which is associated with the model different from the input model with the identified analysis module; and a presenting unit presents the analysis technique including the analysis module replaced.
Abstract: Disclosed herein is a processor for deep learning. In one embodiment, the processor comprises: a load and store unit configured to load and store image pixel data and stencil data; a register unit, implementing a banked register file, configured to: load and store a subset of the image pixel data from the load and store unit, and concurrently provide access to image pixel values stored in a register file entry of the banked register file, wherein the subset of the image pixel data comprises the image pixel values stored in the register file entry; and a plurality of arithmetic logic units configured to concurrently perform one or more operations on the image pixel values stored in the register file entry and corresponding stencil data of the stencil data.
Abstract: Data processing apparatus comprises processing circuitry to apply processing operations to one or more data items of a linear array comprising a plurality, n, of data items at respective positions in the linear array, the processing circuitry being configured to access an array of n×n storage locations, where n is an integer greater than one, the processing circuitry comprising: instruction decoder circuitry to decode program instructions; and instruction processing circuitry to execute instructions decoded by the instruction decoder circuitry; wherein the instruction decoder circuitry is responsive to an array access instruction, to control the instruction processing circuitry to access, as a linear array, a set of n storage locations arranged in an array direction selected, under control of the array access instruction, from a set of candidate array directions comprising at least a first array direction and a second array direction different to the first array direction.
Type:
Grant
Filed:
August 5, 2019
Date of Patent:
July 27, 2021
Assignee:
Arm Limited
Inventors:
Jelena Milanovic, Lee Evan Eisen, Nigel John Stephens
Abstract: Method and system are provided for identifying a source file for use in debugging compiled code. The method includes referencing a compiled file for debugging and searching for potential source files of the compiled file from configured repositories. The method obtains the potential source files from the configured repositories and iterates over the obtained potential source files to compile and compare each potential source file to the compiled file. One or more matching source files are identified for use in debugging the compiled file.
Type:
Grant
Filed:
June 6, 2018
Date of Patent:
July 27, 2021
Assignee:
International Business Machines Corporation
Inventors:
Timothy J. Mitchell, Graham C. Charters, Lewis Evans, Adam J. Pilkington
Abstract: A method of software article protection and transformation includes: retrieving a software article; identifying control flow addressing associated with the software article; removing at least a portion of the control flow addressing; and saving the at least a portion of the control flow addressing from the software article, wherein removing the at least a portion of the control flow addressing comprises replacing call and return functions with protected execution instructions, wherein the protected execution instructions replace call functions by: identifying, in a lookup table, an entry associated with a current instruction; and pushing a return address associated with the current instruction to a secure return stack; and wherein the protected execution instructions replace return functions by: popping the return address from the secure return stack; encrypting the at least a portion of the control flow addressing; and saving the at least a portion of the control flow addressing to a separate software articl
Type:
Grant
Filed:
June 27, 2018
Date of Patent:
July 27, 2021
Assignee:
Ram Laboratories, Inc.
Inventors:
Brooke Wallace, Dean C. Mumme, Robert McGraw
Abstract: Algorithms, examples, and related technology for automatic vectorization of a particular class of loops is described. The loops, denoted “CMMSR loops”, operate to find an extremum and also utilize an index denoting the position of the extremum in an array or other multi-element input. CMMSR loops are identified in a language translator by matching a specified template or having a specified set of parsing results, or both. Generated vectorization code includes, for example, code to compute candidates for the extremum, code to select the same instance of the extremum as a scalar execution when the input contains multiple instances, and wind-down code to compute an index expression based on the selected instance of the extremum. Vectorizations may execute on SIMD hardware or other vector processors.
Abstract: A user terminal device, which can execute an application created based on a dynamically typed language, such as JavaScript, a server, which provides reference information for compilation, and an application executing control method thereof are provided. The user terminal device includes a communicator configured to communicate with at least one server; a storage configured to store data of a source code of an application; and a processor configured to transmit identification information of the source code of the application to the at least one server, receive reference information for compiling the source code corresponding to the transmitted identification information from the at least one server, and compile the source code of the application into a machine code based on the received reference information.
Abstract: Techniques for scheduling and executing functions across a plurality of different Functions-as-a-Service (FaaS) infrastructures are provided. In one set of embodiments, a computer system can determine that a function has been invoked, where the computer system implements a spanning FaaS service platform that is communicatively coupled with the plurality of different FaaS infrastructures. In response, the computer system can retrieve metadata associated with the function, where the metadata includes criteria or policies indicating how the function should be scheduled for execution, and can retrieve information associated with each of the plurality of different FaaS infrastructures, where the information includes capabilities or characteristics of each FaaS infrastructure.
Type:
Grant
Filed:
January 10, 2019
Date of Patent:
June 22, 2021
Assignee:
VMware, Inc.
Inventors:
Berndt Jung, Mark Peek, Xueyang Hu, Ivan Mikushin, Karol Stepniewski
Abstract: A hybrid binary executable under both native processes and compatibility (e.g., emulated) processes. When the hybrid binary is loaded by a native process, the process executes a native code stream contained in the binary directly on a processor. When the hybrid binary is loaded by a compatibility process, the process executes an emulation-compatible (EC) code stream directly on a processor. When executing in a compatibility process, the EC code stream can interact with a foreign code stream that executes in an emulator. The foreign code stream can be included in the hybrid binary itself, or can be external to the hybrid binary. The hybrid binary format supports folding of code between the native code stream and the EC code stream. The hybrid binary comprises a set of memory transformations which are applied to image data obtained from the binary when the hybrid binary executes under the compatibility process.
Type:
Grant
Filed:
August 31, 2020
Date of Patent:
June 22, 2021
Assignee:
MICROSOFT TECHNOLOGY LICENSING, LLC
Inventors:
Pavlo Lebedynskiy, Pedro Miguel Sequeira De Justo Teixeira, Darek Josip Mihocka, Jon Robert Berry, Clarence Siu Yeen Dang, Tiansheng Tan, James David Cleary, Yongkang Zhu, Theodore Maxwell Thomas, Ben Niu, Russell Charles Hadley
Abstract: An automated design system for facilitating intelligent design of electromechanically controlled hydraulic systems. The automated design system utilizes one or more servers and one or more processors for accessing design information related to the hydraulic systems. The design system also includes a display device which provides an interface, an input device and a software program which allow a user to select various design characteristics related to a product design. The automated design system also provides text-based and graphical outputs pertaining to a product design.
Type:
Grant
Filed:
August 8, 2019
Date of Patent:
June 8, 2021
Assignee:
Enovation Controls, LLC
Inventors:
Kennon Guglielmo, Eric Peterson, Doug Conyers
Abstract: A method for identifying a merchant associated with ransomware includes: storing, in a profile database, a plurality of merchant profiles, wherein each merchant profile is related to a merchant and includes at least a merchant identifier; receiving, by a receiving device, an authorization request for a payment transaction, wherein the authorization request includes a specific merchant identifier associated with a merchant involved in the payment transaction, and the payment transaction is initiated by a computing device infected with one or more ransomware application programs; identifying, by a processing device, a specific merchant profile in the profile database where the included merchant identifier corresponds to the specific merchant identifier included in the received authorization request; and updating, by the processing device, the specific merchant profile in the profile database to include an indication that the related merchant is associated with the distribution of the one or more ransomware appl