Application management system
DCFirst Claim
Patent Images
1. A processor apparatus, comprising:
- multiple processors, wherein one or more of the processors are configured to operate in a distributed processing system and configured to;
identify a new device that is not currently coupled to the processing system,connect the new device to the processing system when signaling from the new device conforms to a communication protocol used in the processing system;
configure the new device to operate with the processing system;
identify data codes in the signaling from the new device identifying an application running on the new device, a data type used on the new device, or a security attribute associated with at least one of the new device, data stored in the new device, or the application running on the new device;
use the identified security attribute to prevent at least one of an unauthorized application or unauthorized data from being processing by the processing system;
identify at least one stored application in memory accessible by the processor, wherein the application processes the same data type used by the new device;
responsive to identifying the stored application, download the stored application from memory into the processing system;
use the application to process data received from the new device; and
select an appropriate human machine interface to output the data.
10 Assignments
Litigations
0 Petitions
Accused Products
Abstract
The present invention allows construction of a secure, real-time operating system from a portable language such as Java that appears to be a Java virtual machine from a top perspective but provides a secure operating system from a bottom perspective. This allows portable languages, such as Java, to be used for secure embedded multiprocessor environments.
225 Citations
25 Claims
-
1. A processor apparatus, comprising:
multiple processors, wherein one or more of the processors are configured to operate in a distributed processing system and configured to; identify a new device that is not currently coupled to the processing system, connect the new device to the processing system when signaling from the new device conforms to a communication protocol used in the processing system; configure the new device to operate with the processing system; identify data codes in the signaling from the new device identifying an application running on the new device, a data type used on the new device, or a security attribute associated with at least one of the new device, data stored in the new device, or the application running on the new device; use the identified security attribute to prevent at least one of an unauthorized application or unauthorized data from being processing by the processing system; identify at least one stored application in memory accessible by the processor, wherein the application processes the same data type used by the new device; responsive to identifying the stored application, download the stored application from memory into the processing system; use the application to process data received from the new device; and select an appropriate human machine interface to output the data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
13. A processing method, including:
-
operating a processor system, wherein a processor is coupled to at least a second processor in at least one of an autonomous processing mode or a distributed processing mode, the processor system configured to; identify a new device that is not currently coupled to the processor system, connect the new device to the processor system when signaling from the new device conforms to a communication protocol used in the processor system; configure the new device to operate with the processor system; identify data codes in the signaling from the new device identifying an application running on the new device, a data type used on the new device, or a security attribute associated with at least one of data stored in the new device or the application running on the new device; use the identified security attribute to prevent at least one of an unauthorized application or unauthorized data from being processed by the processor system; identify at least one stored application in memory accessible by the processor system, wherein the application processes the same data type processed by the new device; responsive to identifying the stored application, download the stored application from memory into the processor system; use the application to process data received from the new device; and select an appropriate human machine interface to output the data. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
Specification