Yodaiken
Victor Yodaiken, City Socorro, NM US
Patent application number | Description | Published |
---|---|---|
20100242031 | Systems and Methods for Dynamically Linking Application Software into a Running Operating System Kernel - The present invention provides systems and methods for dynamically linking modules into a running operating system kernel. Systems and methods described herein have the following advantages: (1) they permit an application programmer to write, compile, execute, and terminate application code that is to be loaded into a kernel as if the application code was an ordinary application program, (2) they allow a standard programming environment to be used to encapsulate application software in a familiar environment, and (3) they permit automatic cleanup of errors and freeing of program resources when the application terminates. | 09-23-2010 |
Victor Yodaiken, Austin, TX US
Patent application number | Description | Published |
---|---|---|
20120311168 | METHOD FOR IMPROVING ACCURACY IN COMPUTATION OF ONE-WAY TRANSFER TIME FOR NETWORK TIME SYNCHRONIZATION - A method for improving accuracy in the computation of a one-way transfer time between two networked devices. In one aspect, variability in time transfer latency that is caused by cache loading, data structure setup time, and scheduling variability in software is reduced by initiating a first sequence of loading data structures into cache and priming scheduling, and then initiating a second sequence of calibrating the timing of a subsequent synchronization message so that the completion of the first sequence occurs just in time for the reception of the synchronization message. The method is applicable for any network time synchronization protocol, including Network Time Protocol (NTP) and Precision Time Protocol (PTP). | 12-06-2012 |
20140003199 | METHOD, TIME CONSUMER SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR MAINTAINING ACCURATE TIME ON AN IDEAL CLOCK | 01-02-2014 |
Victor J. Yodaiken, Austin, TX US
Patent application number | Description | Published |
---|---|---|
20080256236 | System, method and computer program product for monitoring and controlling network connections from a supervisory operating system - A system, method and computer program product that is designed to support high-availability, rapid fault recovery, out of band condition signaling and/or other quality of service assurances and security in a networked environment. In one aspect, a method of the invention includes the step of providing a processing system with a dual-kernel or multi-kernel software operating system. The operating system includes a supervisory operating system and a secondary operating system that provides network functions to user applications. The method also includes the step of providing a Network Control Software (NCS) in the supervisory operating system. The NCS is configured to transparently monitor and control network operations in the secondary operating system. | 10-16-2008 |
20100011444 | Systems and Methods for Detecting A Security Breach in a Computer System - The present invention provides systems and methods for applying hard-real-time capabilities in software to software security. For example, the systems and methods of the present invention allow a programmer to attach a periodic integrity check to an application so that an attack on the application would need to succeed completely within a narrow and unpredictable time window in order to remain undetected. | 01-14-2010 |
Victor J. Yodaiken, Socorro, NM US
Patent application number | Description | Published |
---|---|---|
20090204709 | System, method and computer program product for monitoring and controlling network connections from a supervisory operating system - A system, method and computer program product that is designed to support high-availability, rapid fault recovery, out of band condition signaling and/or other quality of service assurances and security in a networked environment. In one aspect, a method of the invention includes the step of providing a processing system with a dual-kernel or multi-kernel software operating system. The operating system includes a supervisory operating system and a secondary operating system that provides network functions to user applications. The method also includes the step of providing a Network Control Software (NCS) in the supervisory operating system. The NCS is configured to transparently monitor and control network operations in the secondary operating system. | 08-13-2009 |
20120066766 | SYSTEMS AND METHODS FOR DETECTING A SECURITY BREACH IN A COMPUTER SYSTEM - The present invention provides systems and methods for applying hard-real-time capabilities in software to software security. For example, the systems and methods of the present invention allow a programmer to attach a periodic integrity check to an application so that an attack on the application would need to succeed completely within a narrow and unpredictable time window in order to remain undetected. | 03-15-2012 |
20130145467 | SYSTEMS AND METHODS FOR DETECTING A SECURITY BREACH IN A COMPUTER SYSTEM - The present invention provides systems and methods for applying hard-real-time capabilities in software to software security. For example, the systems and methods of the present invention allow a programmer to attach, a periodic integrity check to an application so that an attack on the application would need to succeed completely within a narrow and unpredictable time window in order to remain undetected. | 06-06-2013 |