Method for multi-tasking multiple java virtual machines in a secure environment
DCFirst Claim
Patent Images
1. A computer system, comprising:
- a memory;
a real-time operating system;
a user interface;
one or more processors in a processing system, wherein the processing system is configured to;
operate a transceiver,detect a new device within communication range of the transceiver,detect a protocol used by the new device,communicate with the new device in response to the detected protocol conforming with a protocol used by the processing system;
an application management system configured to;
identify data parameters that include at least one of data codes, data type and device ID associated with the new device,verify the new device data parameters as at least one of authorized or unauthorized; and
responsive to verifying the data parameters as authorized, connect to the new device, dynamically configure an application to process the data types and launch the application in the distributed processing system, wherein the application in response to launching is configured to take over control and operation of the new device including;
initiating transfer of data from the new device to the operating system; and
initiate processing of the data received from the new device.
10 Assignments
Litigations
1 Petition
Accused Products
Abstract
The present invention allows construction of a secure, real-time operating system from a portable language such as Java that appears to be a Java virtual machine from a top perspective but provides a secure operating system from a bottom perspective. This allows portable languages, such as Java, to be used for secure embedded multiprocessor environments.
228 Citations
30 Claims
-
1. A computer system, comprising:
-
a memory; a real-time operating system; a user interface; one or more processors in a processing system, wherein the processing system is configured to; operate a transceiver, detect a new device within communication range of the transceiver, detect a protocol used by the new device, communicate with the new device in response to the detected protocol conforming with a protocol used by the processing system; an application management system configured to; identify data parameters that include at least one of data codes, data type and device ID associated with the new device, verify the new device data parameters as at least one of authorized or unauthorized; and responsive to verifying the data parameters as authorized, connect to the new device, dynamically configure an application to process the data types and launch the application in the distributed processing system, wherein the application in response to launching is configured to take over control and operation of the new device including; initiating transfer of data from the new device to the operating system; and initiate processing of the data received from the new device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method for reconfiguring applications, comprising:
-
operating a wireless device manager in a first processor, the wireless device manager configured to; monitor for wireless signals from a new device not currently coupled to the first processor, wherein the new device runs a first software application that processes a first type of data; and wirelessly connect the new device to the first processor; operate a configuration manager, the configuration manager configured to; monitor operations of the first processor, identify data codes in wireless signals from the new device and use the data codes to identify the first type of data processed by the first software application running on the new device, responsive to identifying the data codes from the new device, identify a second software application from among multiple different software applications, wherein the second software application is associated with the first type of data processed by the new device, download a copy of the second software application to a second processor, configure the second processor to run the second software application, process data from the new device with the second software application; and
operate a security manager configured to verify authority of the new device or authority of the first type of data to access at least some of the software applications by configuring the second software application according to the data codes. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification