Content isolation by processes in application
FIELD: information technology.
SUBSTANCE: in a version of the invention, execution of one or more processes which include content received through a network is controlled by another process of the same application which includes the one or more processes. The control involves ending one or more processes if they are not responding. Execution of one or more processes is isolated from the other process such that when one or more processes are not responding, the other process remains responsive. Content in the one or more ended processes is then restored.
EFFECT: isolating content through processes in an application.
20 cl, 5 dwg
The LEVEL of TECHNOLOGY
Applications can be made with the ability to consume a wide variety of content. For example, the browser application may be configured to navigate through a wide variety of content available via a network, such as web pages, music, online video, and so the Internet content is usually not credible and/or unreliable and, therefore, its execution must be limited in the use of resources, and access control. In some cases, this content can be executed as code extension, which serves to extend the functionality of the browser application, which is sometimes referred to as "plug", "third-party plugin", "optional component" and so on. However, this code extensions can have a harmful effect on the execution of the browser application, even bringing it to the point of failure. He may also try to perform actions that the user would not want to occur.
For example, the browser application may receive third-party plugin to extend the functionality of the browser application. As this is a "third-party" plug, however, it can be written in accordance with what standards of quality, which are not consistent with the standards of the author of the browser application. For example, an additional module may cause a failure during execution in conjunction with the browser application. Because the plugin is code extensions that can share resources with the browser application, the failure of the plug can cause the failure of a browser application, such as the crash, freeze, etc.
A BRIEF DESCRIPTION of the INVENTION
Described the isolation of content through processes in the application. In the embodiment, one or more processes, which contain the content received through the network is controlled by another process of the same application, which includes one or more processes. Management includes termination or restart one or more processes when they are not responding, crash, or otherwise not running properly. Performing one or more processes is isolated from other processes in such a way that, when one or more process does not respond, another process remains responsive. Then the content in the completed one or more of the processes is reversed. Therefore, the execution of one or more processes may be isolated from other processes so that their customer is the resource ID and access control can be set and limited on the basis of policy for the source of Internet content and performing its user. Content from the Internet can then be managed by the identity of the client operating system and/or restrictions access control characteristic of the source of the Internet and, moreover, applied on the basis of the identity of a user of the local client.
In another embodiment, one or more machine-readable media includes commands that are executable to provide the browser application can maintain one or more processes tab, and the process frame. One or more processes tab contain content that is passed through the network so that each process tab isolates the corresponding content from one another. The process of frame controls the execution of one or more processes tab. At least one of the processes tab assigned a trust level, which is lower than the process of the frame so that the frame has access to one or more resources that are not available to the content contained at least in one process tab.
This is a brief description is provided in order to explicitly represent a selection of ideas that further described below in the Detailed Description. This brief description is not intended to identify key features or essential features of the declared pre is meta, and is not intended to be used as a means to determine the scope of the claimed subject matter.
LIST of FIGURES
The detailed description is described with reference to the accompanying figures. In the figures, the leftmost digit(s) of a reference number identifies the figure in which the reference number appears for the first time. Using the same reference numbers in the various examples in the description and the figures may indicate similar or identical elements.
Fig. 1 is an illustration of an environment in a typical embodiment, which is working to use technology in isolation.
Fig. 2 is an illustration of the architecture, showing components that can be used for infrastructure applications.
Fig. 3 describes a typical infrastructure isolation for browser applications as organized by level.
Fig. 4 is an illustration of a typical variant of the process frame and workflow tab, as implemented through the components of Fig. 2 and 3.
Fig. 5 is a flowchart describing a procedure in a typical embodiment in which one or more processes that isolate the content is controlled by other processes.
A variety of different applications, which performs received through the network content can be extended by dynamically loaded and executed provided Internet content. This content may include both "external"and "internal" code, but in any case, it calls the execute commands on the local computer. This content includes not only "specific Internet site code, such as HTML, but also "extension code"which may include "plugins", "additional components", "drivers", etc. that are designed to run on a different or all the contents of the Internet site or on the resources of the local machine.
The extension code is usually represented as "machine code"that runs without the standard access control mechanisms in the Internet or control mechanisms reliability. He may have varying levels of quality and trust. Additionally, the extension code can work with the application that it hosts, to use resources (such as memory, file handles, the process space, and so on). Therefore, the failure code expansion can also cause application failure (for example, to cause a "crash" or "freeze" applications), to cause inefficient consumption of resources, can lead to violation of security the spine, etc.
Described the isolation of content received via a network (e.g., Internet content), through the processes in the application. In the embodiment, in order to isolate the execution of Internet content used processes. For example, the web browser may be configured to include a process frame, which is responsible for managing (and consequently, in the following description, also referred to as the "process management") the main functionality of the browser, such as the formation of functionality and control of the browser, including buttons "back" and "forward" to go on a web page, the address bar, which takes as input the address of a uniform resource locator (URL), etc.
The browser application may also support the processes that are used to isolate (and consequently, in the following description, also referred to as "isolation") content passed through the view underlying the functionality of the browser application. These processes, for example, can be displayed as tabs within the browser application, each running in a separate process. The process frame can be performed in order to control the processes tab and from isolation, and if one or bol is e processes tab was denied (for example, not responding), the process frame may continue to run as intended together with other processes tab, which is not denied. Additionally, the process frame may take one or more corrective effect is to terminate an unresponsive process tab, and then restore the content that was made in the process tab. Also consider the variety of other examples, further discussion of which may be found in the description of the following figures.
In another embodiment, isolation technology can be used in conjunction with the "valuation of trust in order to limit the access control and identity content. The previously described content, adopted via the Internet, including the extension code can be written with intention and in order to achieve goals that are not in the interests of the user or the local client. Therefore, the assessment of the credibility of the content can be done using, for example, knowledge about the source of content or tools used to identify and/or receive content that is used to assign a level of "identity and access management for appropriate content. Evaluation of the trust can be used as the basis for access to computer resources, kotoryeprodayut extension code. However, conventional technologies have been made on the basis of "per application". For example, to interact with web content having different trust executed multiple browser applications that do not use the access control client operating system, and identified that possibly resource inefficient and possibly upsetting and confusing for the user from the standpoint of ease of operation. Further discussion of trust can also be found in the description of the following figures.
The following discussion first describes a typical environment, which is working to use technology in isolation. Then describe the typical procedures that can be used in a typical environment, as well as in other environments. Although some examples described by the browser application as using insulation technology, this technology can use a variety of other applications that perform Internet content, such as applications, "technical innovations"that perform third-party extension code (for example, on the sidebar) on the working surface of the computer in order to provide additional functionality, such as information about the weather, headlines, interactive video, etc.
Fig. 1 is an illustration of an environment 100 in a typical embodiment, which is working to use technology to isolate. Illustrated environment 100 includes many providers 102(1)-102(M) content and the computer 104 that communicative connected to each other via a network 106. The computer 104 may be skompanovan different ways. For example, the computer 104 may be configured to exchange information via the network 106, such as a desktop computer, a mobile station, a device for entertainment, television STB, communicative connected with a display device, a wireless phone, a game console, etc.
Although the network 106 is illustrated as the Internet, the network may assume a wide variety of designs. For example, network 106 may include a wide area network (WAN), local area network (LAN), wireless network, telephone network (PSTN), an intranet, and so forth. Additionally, although shown a single network 106, the network 106 can be implemented with the possibility to include various networks.
Each of the variety of content providers 102(1)-102(M) is illustrated as including modules 102(1)-102(M) of the corresponding content to the e are examples of functionality for in order to provide relevant content 110(c), 112(k) (where "c" and "k" can be an integer value between 1 and "C", 1 and "K" respectively) to the computer 104 via the network 106. The content can be formed in various ways. For example, the content 112(k) may be generated as web pages 114, scripts 116, the extension code 118, etc.
The computer 104 is illustrated as including a processor 120 and memory 122. Processors are not limited by the materials from which they are formed, or used by the processing machinery. For example, the processor can comprise a semiconductor(s) and/or transistors (e.g., electronic integrated circuits (IC)). In this context, executed by the processor commands may be commands that are executed with the help of electronic devices. Alternatively, the mechanisms of processors or mechanisms for processors and, therefore, computing devices or computing devices may include, but are not limited to, quantum computing, optical computing, mechanical calculations (for example, using nanotechnology), and so on. In addition despite the fact that showing one memory 122 may be used in a wide variety of types and combinations of memory, such as random access memory (RAM), memory, hard disk, removable storage devices, and other types machinecut the controlled media.
The computer is also illustrated as executing by the processor 120, the application 124, which is stored in memory 122. The application 124 may be configured to provide a wide variety of functionality, such as a browser application (further description of which can be found in the description of Fig. 3), a working application, etc.
As an example, the application 124 may follow the model of the component and the structure of the isolation that can use the basic elements of the operating system (e.g., processes) in order to isolate components from each other through the use of management processes and processes of isolation. Such an example is shown for the application 124 as infrastructure isolation, which includes a process frame 126, which is an example of a management process and set of processes 128(1)-128(T) tabs, which are examples of isolation. The process frame 126 is an example of the operation in order to manage the processes 128(1)-128(T) tab, as, for example, to make a decision "where" in computer resources 104 (e.g., the processor 120 and/or memory 122) processes 128(1)-128(T) tab should be implemented and/or maintained to track the lifetime and the ability to respond to the processes tab 128(1)-128(T), terminate processes 128(1)-128(T) tab,restore the content 112(1)-112(T), when the processes 128(1)-128(T) tab, refuse, etc. Therefore, the content 112(1)-112(T) in the corresponding processes 128(1)-128(T) tab does not interfere with the execution of the process 126 of the frame, thereby maintaining the responsiveness of the process 126 of the frame, even when one or more processes 128(1)-128(T) tab, and the enclosed content 112(1)-112(T) are not liable, and further discussion of which may be found beginning with the description for Fig. 4. In an additional embodiment, this isolation is achieved through the separation process, which additionally holds the content 112(1) in the same process 128(1) tab from the intersection with the content 112(T) in another process 128(T) tab in one application, such as application 124.
Isolation technology, such as infrastructure isolation can also support a variety of other functionality. For example, isolation of content 112(1)-112(T) in the corresponding processes 128(1)-128(T) tab may allow the use of different levels of "trust" in one application. The content 112(1)executed in the process 128(1) tab, for example, may be assigned a trust level that is lower than the level of trust assigned to process 126 of the frame. Consequently, the frame 126 may have permission to access additional resources (such as software, such the AK operating system and/or hardware, such as shared memory)to which the content 112 (1) 128(1) does not have access permission. Similarly, the content 112(1) 128(1) tabs may be assigned a trust level other than the level of content 112(T) 128(T) tab, and given access to different resources within the same application 124. Further discussion of the trust levels can be found in the following discussion since the description to Fig. 5.
The use of processes in one application can support a variety of other functionality. For example, the processes may be executed with the ability to carry a different number of "bits" so that the process frame 126 can run on 64 bits, while one or more processes 128(1)-128(T) tab work on 32 bits, and the processes 128(1)-128(T) tab can work on different (from each other) bandwidths, etc. will also be a variety of other examples, further discussion of which may be found the descriptions to the following figures.
In General, any feature described here can be implemented using software, firmware (e.g., fixed logic circuitry), manual processing, or a combination of these performances. Used herein, the terms "module," "functionality," and "logic is generally represent software, firmware, or a combination of conventional and firmware. If implemented in software, the module, functionality, or logic represents program code that performs specified tasks when executed by a processor (e.g., CPU or CPUs). The program code may be stored on one or more machine-readable memory devices, such as memory 122 of Fig. 1. The following signs technology isolation are platform-independent, meaning that the technology can be implemented on a variety of commercial computing platforms having a variety of processors.
Fig. 2 depicts the architecture 200, showing the components 202, 204, which can be used for infrastructure applications. The architecture 200 may provide infrastructure isolation (ISO), which serves as the basis for the features of the application. ISO can be separated by the application code into separate subsystems that can be reused, for example, used many times by different features of the application and to verify so that correctness, security, and reliability of the ISO can be checked directly.
For example, the ISO can be created so that the s to provide asynchronous communication. A composite object model (COM), for example, is a duplex mechanism and for this reason does not support half-duplex communication. In another example, the ISO can support different levels of trust for the identification, commitment, knowledge level of trust for identification and to provide the ability to detect a level of trust. In an additional example, the location identification means may vary between in-process in-stream, in-process/another thread, another thread, another level mandatory integrity/compartment, etc. In another example, the ISO may give the ability to change and enhance performance "under" application programming interfaces (API) ISO.
On the main unit architecture 200 ISO can be thought of as "component", examples of which are illustrated in Fig. 2 as a component component 202 and 204 of the architecture 200. About the component can be thought of as the allocation unit and messaging. In the illustration of Fig. 2 components 202, 204 have WINDOWS (WINDOWS is a trademark of Microsoft Corp., Redmond, Washington) loops 206, 208 to process the message. The components 202, 204 further illustrated as existing "to" relevant threads 210, 212 and corresponding processes 214, 216 (for example, the process WINDOWS). Despite the fact that the corresponding threads 210, 212 are illustrated separately, they may in order to usestat "inside" of the relevant processes 214, 216.
Between the components 202, 204 may be supported by a variety of different types of communication. For example, the components may communicate using asynchronous message 218 through the message loop. In another example, make cross-apartment synchronous COM (Composite Model Object) call can be made in containers COM so that the call to the COM object can enter or postpone the object. In an additional example, the joint buffer 222 may be used, for example, for streaming data. Also assumed more and more examples.
Fig. 3 depicts a typical infrastructure 300 isolation for the application 302 browser as organized by levels. The "lower" level (for example, the method of abstraction) application browser 302 in Fig. 3 includes a low-level communications 304 (for example, WINDOWS messaging) and low-level shared memory 306. Next level 308 includes physically-based application programming interfaces (APIs), such as streams, buffers, processes, levels of mandatory integrity (MIC), etc. Next level includes components 310, such as identity, security, messaging and identity of the resource. The top level in the illustrated example includes steps 312, such as asynchronous serial programmed the e, as "intermediaries" and interfaces, such as COM-like" asynchronous programming, which asynchronously simulates COM technology.
Fig. 4 is an illustration of a typical variant of implementation of the process 400 402 frame and process 404 tabs as implemented through the components of Fig. 2 and 3. Process 402 of the frame and the process 404 tabs may correspond to or may not correspond to the process frame and the process tab of Fig. 1.
A typical implementation 400 of Fig. 4 is illustrative for infrastructure isolation that separates the application in Fig. 1 components and manages the exchange and sharing of data and control between these components. The use of the infrastructure isolation contributes freely interacting component view of the application, as suggested in the figure.
Process 404 tab is the "borders" of the content and can be performed with the opportunity to isolate the content from one another through the use of multiple tabs. Therefore, although illustrated only process 404 tabs may be performed multiple processes tab.
Process 404 tabs, for example, can be used to "contain" the extension for an application such as application 302 Explorer in Fig. 3. Examples of content that "is" in process 404 tabs illustrated as streams 406, 408, and "iso" (i.e. insulation) stream 410. Each of the threads (for example, the thread of the frame 406, 408 and 410 is illustrated as a component, as previously described in the description to Fig. 2, and as a consequence include processing WINDOWS messages, threads, and processes. Process 404 tabs can be performed "in-process" in relation to the frame and can be run "out of process" in relation to other processes. Although not illustrated, the process 404 tabs may also include managing the thread that "owns" the content of the process 404 tabs.
The process frame 402 includes managing the flow 406, which is an example of functionality to manage the implementation process 404 tabs. For example, the process 402 of the frame by means of a control flow 412 may decide, "where" should be performed, the process 404 tabs can monitor the existence and the responsiveness of the process 404 tabs and may send, to replace or repair process 404 tabs when the error occurred. Managing the flow 406, for example, may determine that the process 406 tab "hung" (for example, caught in an infinite loop) and for this reason, restores the process 404 tabs to find the content that was previously executed by the workflow tab. Thus, the affected process 44 of the tab is restored without reinitializing the entire application, for example, in this case, the browser application. Communication between threads and processes can be performed as previously described in the description of Fig. 2.
Therefore, in the process of the frame there is one control flow (e.g., "authorized", the control flow), which performs control functions, such as tracking the time of life, etc. there are Also one or more threads of the frame, which are responsible for rendering the user interface frame (e.g., back button, buttons, forward, address bar etc) and is responsible for the input of user data in the frame.
In the process tab, there is one control thread (which is not authoritative control stream, as described for the process of frame), which is responsible for the further creation of component isolation in the process tab on request frame. There are also one or more threads tab, which perform the components tab in the workflow tab and are responsible for rendering the content tab (e.g., HTML pages) and is responsible for the use of the input content.
Additionally, there may be zero or more threads of a component to other components that may be performed during a frame, or in the process tab. They are not the tab, but isolated in the same process to add the benefits of isolation, but to prevent a surge in productivity due to the acceleration of the process for each of them.
A TYPICAL PROCEDURE
The following discussion describes the insulation technology, which can be implemented using the previously described systems and devices. Aspects of each of the procedures can be implemented in hardware, embedded software or software or combinations thereof. The procedure is shown as a set of blocks that set of actions performed by one or more devices and are not necessarily restricted procedure is shown to perform actions corresponding blocks. In some parts of the following discussion may be made by reference to a typical environment, described in the descriptions for Fig. 1-4.
Fig. 5 depicts a procedure 500 in a typical implementation in which one or more processes that isolate the content is managed by another process. Performing one or more processes, which contain content that is passed through the network managed by another process of the same application, which includes one or more processes (block 502). For example, the application 124 is illustrated as comprising the process 126 of the frame and a set of processes 128(1)-128(T) tab. The application 124, for example, may correspond to the application 302 browser the user process 126 of the frame, responsible for delivery of the basics of control elements (for example, buttons to move backward and forward, address bar etc), inside of which passed through the network 106, the content 118(c), 112(k) can be deduced through the use of processes 128(1), 128(T) tab. Therefore, the application window 302, the browser may include a frame provided by the process 126 of the frame, whereby the content 112(1)-112(T) is given by processes 128(1)-128(T) tab. Although described receiving content over a network, the content may be made by a variety of other ways, such as through machine-readable medium.
Management may also include the completion of one or more processes, when it does not respond (block 508). Process 126 of the frame, for example, may periodically poll the processes 128(1)-128(T) tab. When the response is not received from one or more processes 128(1)-128(T) tab during a predefined period of time corresponding to one or more processes 128(1)-128(T) tab can be completed. Therefore, even when one or more processes 128(1)-128(T) tab is denied (for example, "hang", "busy" and so on), this waiver is not "distributed" in process 126 of the frame (for example, on the execution of other processes tab), so that the process tab remains responsive. Accordingly, it could be taken a variety of corrective actions.
As an example, the content can be restored in one or more processes (block 510). For example, the process frame 126 can determine "where" (e.g., URL) was received content 112(1) in the process tab, then start the process 128(1) tab, which was completed, and again to get the content 112(1). Therefore, unlike call of General application failure, than previously encountered in such a situation, the content 112(1) may be restored automatically and without volatils the VA user.
Although the invention has been described in language specific to structural features and/or methodological acts, it should be clear that the invention defined in the attached claims is not necessarily limited to the specific features or described actions. On the contrary, the specific features and steps are disclosed as typical forms of implementing the claimed invention.
1. Machine-readable media containing commands that are executable to provide the application with:
one or more isolation, which contain the extension code, adopted via the Internet, to add functionality to the application; and
the management process to control the execution of one or more of these processes in isolation, so performing unwanted actions by executing code extensions in the corresponding process isolation is isolated from and controlled by a management process, and this process of isolation is additionally isolated from other process isolation, these respective process isolation includes:
managing the flow of process isolation, configured to generate, in response to a request from a process control components for isolation mentioned what about the corresponding process isolation moreover, these components are referred to the corresponding process isolation is configured to communicate with one another,
one or more threads of execution to execute code extension corresponding to the aforementioned respective process isolation.
2. Machine-readable media according to claim 1, when this application is a browser application to navigate through the content available through the Internet.
3. Machine-readable media according to claim 2, in which:
the control process executed as a process frame that provides one or more control elements that are selectable to perform the move; and
these one or more controls include a back button, forward button forward and address bar.
4. Machine-readable media according to claim 1, with the extension code is a plug-in, third-party plug-in or extension.
5. Machine-readable media according to claim 1, the management of the one or more isolation through the management process includes the recovery code expansion and its current execution context in the corresponding process isolation when the corresponding process isolation refused.
6. Machine-readable media according to claim 1, the management executing one or more processes of isolation through the management process involves identifying, responding execution of expansion in the corresponding process isolation.
7. Machine-readable media according to claim 6, while managing one or more processes of isolation through the management process includes the completion of that process isolation, when the extension code in the corresponding process isolation does not respond.
8. Machine-readable media according to claim 1, for performing the process control is provided by the identity and the level of trust that differ from those of one or more isolation, so that process control is ensured by access to resources that do not feature these one or more isolation.
9. Machine-readable media according to claim 1, the connection between the management process and the above-mentioned one or more isolation involves the use of one or more asynchronous messages.
10. Machine-readable media according to claim 1, in which:
mentioned one or more isolation include the first process and second isolation process isolation; and
the relationship between the first and second isolation includes one or more asynchronous messages.
11. Machine-readable media on which is stored commands that, if client C is subject
instruct the client system to provide a browser application with:
one or more of the processes tab in the browser application, which is associated with the corresponding tabs in the user interface that have passed through the network content, so that each process tab isolates the corresponding content from one another and from other parts of the client system based on the assessment of the reliability of the content; and
the process frame in the browser application to control the execution of one or more of these processes tab, and at least one workflow tab is assigned a trust level that is lower than that of the process frame, so the frame has access to one or more resources that are not available to the content contained in at least one process tabs, with each tab includes:
managing the process flow tab, configured to generate, in response to a request from the process frame components to isolate this process tab, and these components of the process tab configured such that one component communicates with another component using at least asynchronous messaging, and
one or more flow visualization for the visualization of the corresponding content this is the process tab.
12. Machine-readable media according to claim 11, while the assessment of confidence based at least in part, on the intent or reliability of the content.
13. Machine-readable media according to claim 11, while another process tab is assigned a trust level that is different from the aforementioned at least one workflow tab, so that the content of that other process tab has access to the aforementioned one or more resources that are not available to the content contained in said at least one process tab.
14. Machine-readable media according to claim 11, while another process tab is assigned a trust level that is different from the aforementioned at least one workflow tab, so that the content of both mentioned processes tab does not have access to the aforementioned one or more resources that are available to content contained in at least one other process tab.
15. Machine-readable media according to claim 11, the content includes the extension code from a third party, which is the executable to extend the functionality of the browser application.
16. Machine-readable media according to clause 15, the execution code extensions in the corresponding workflow tab is isolated from the process frame, so that the denial code ID is in the corresponding process tab does not cause failure of the process frame.
17. A computer-implemented method of isolation by processes in the application, containing the steps are:
manage one or more processes in a single application, which contain content that is passed through the network, through another process of the same application, which includes one or more processes, through:
the completion of the aforementioned one or more processes when they do not respond, thus the performance of these one or more processes isolated from the other process, so that when the said one or more processes do not react, the other process remains responsive, these one or more processes are isolated from the other process using separate controls for isolating each of these one or more processes and one management tool for isolating one process configured to create the components for this one process, which communicated with each other to isolate this one process; and
restoring content in the completed one or more processes; and
manage and constrain identity and access control mentioned one or more processes.
18. The method according to 17, in which the isolation of the execution of the said one or more% who saw from the other process is carried out by running in different processes.
19. The method according to 17, in which the isolation of the execution of the said one or more processes from the other process is performed by using one or more asynchronous messages, so that the failure referred to one or more processes to answer these one or more asynchronous messages for the other process does not cause the failure of that other process.
20. The method according to 17, in which the content includes the extension code.
FIELD: information technologies.
SUBSTANCE: in the method of automated language detection and (or) text document coding, byte sequences are identified, and statistics of frequency of identified byte sequences is counted. Then, using the statistics, profiles of each language and (or) each coding are built, a search engine is built to extract sought-for byte sequences from the byte flow of the inspected document, and the built search engine and profiles of languages and (or) codes are saved into the memory. Byte sequences are found in electronic version of each inspected document with the help of the search engine, and statistics of frequency of found byte sequences is counted as the profile of the inspected document. The calculated profile of the inspected document is compared with profiles of languages and (or) codes to identify relevance of the language and (or) code to this inspected document.
EFFECT: expanded arsenal of technical facilities, making it possible to automatically detect language and coding of text according to previously collected statistics in any text documents.
FIELD: information technology.
SUBSTANCE: first version and at least one cell associated with the document are received, wherein at least one cell has a cell identifier and the cell identifier is associated with the first version, having at least one first version identifier. Each of the at least one first version identifiers presents cell status at a moment in time, and the coverage area defines a plurality of cells and versions, the coverage area including at least one root object. Updates for a first computing device are received. The updates indicate the identifier of the updated version, associated with each cell, associated with the document. The first version of each cell is stored if the first version identifier matches the identifier of the updated version of the cell. A new version of each cell is generated, wherein generation of the new version includes assigning a new version of the identifier of the new version if the identifier of the first version of the cell does not match the identifier of the updated version of the cell. Any cell on which there were no links in root objects is deleted and the document is synchronised by replacing cells with a new version of each cell.
EFFECT: reduced volume of altered information.
12 cl, 6 dwg
FIELD: information technologies.
SUBSTANCE: associative Identifier of Events, Technological, implements a circuit of identification of expected design events/conditions of a control system, determined readings of primary sensors of process control, and whenever such occur, it generates alternative design data for direct control of process without application of software and processor resources in asynchronous mode and at the moment of control data arrival, at the same time it includes a multi-layer architecture of an item, organising address-free space of memory and providing for equal and asynchronous access of input information to each layer, in respect to input data, all layers are interconnected memory cells with elements of data comparison and control of recording procedure.
EFFECT: increased indices of reliability, trustworthiness and validity.
3 cl, 3 dwg
FIELD: radio engineering, communication.
SUBSTANCE: disclosed system for controlling, collecting and processing data with onboard spacecraft recording equipment includes at least one onboard recording equipment unit connected by at least two communication channels to a data control and processing unit, which is connected onboard spacecraft equipment through at least one communication channel for subsequent collection of information on Earth. The data control and processing unit includes: an interfacing device, a self-contained timer, a single-board computer, a forced cooling system, a heat sensor system, a storage unit, a synchronous data transmission unit, a secondary power unit and a command transmission and power distribution system.
EFFECT: easier and reliable simultaneous connection to different onboard recording equipment.
7 cl, 2 dwg
FIELD: oil and gas industry.
SUBSTANCE: stages of the proposed method involve acquisition of database of oil deposit, which are related to oil-field objects. A self-organising map (SOM) is formed by means of the following: assignment of each of multiple data fields to one of multiple SOM maps. Each of multiple oil-field objects is assigned to one of multiple SOM positions based on the pre-determined SOM algorithm for presentation of statistical patterns in a variety of databases of oil deposit. Stochastic database is formed of databases of oil deposit based on artificial neuron network for databases of oil deposit. Screening of databases of oil deposit is performed to identify candidates from oil-field objects. Besides, screening is based on stochastic database. Detail assessment of each of the candidates and selection of oil-field object of candidates based on detail assessment is performed. Oil-field operations for the chosen oil-field object are performed.
EFFECT: improving assessment accuracy of oil-field objects.
22 cl, 23 dwg
FIELD: information technology.
SUBSTANCE: method for digital distribution of media content using a distribution main line system comprises steps of receiving a media content request from a client, the request including the profile of the client; performing inventory check and analysis of source assets by iteratively going through the client profile to generate output data; mapping functionalities, wherein several rules enable to map source assets onto the client profile; and scheduling the production process, which determines work elements and execution steps based on functionalities mapped in response to the media content request from the client.
EFFECT: automation of a process which downloads content in digital format and seamlessly manages said content by delivering to the client.
27 cl, 23 dwg
FIELD: radio engineering, communication.
SUBSTANCE: information on characteristics of weapons of each party is switched; the information is stored in a first memory unit; the information is supplemented with characteristics of a backup group with variable input time; information on weapons of all groups is used to pre-evaluate characteristics of their difference and determine coefficients of independent combat superiority of party A over groups B1, B2; the obtained information is used to select a strategy of combat operations; the remaining weapons of all groups are determined; intermediate characteristics of groups and the outcome of combat operations are stored in a second memory unit and read therefrom, and then transmitted to inputs of a display unit, where information on the outcome of combat operations of party A is displayed: win, loss, draw; the remaining weapons in groups: type of strategy, delayed backup, type of difference, values of coefficients of combat superiority and coefficients of distribution of weapons.
EFFECT: high combat efficiency and effectiveness of operations with different groups, rapid planning of the selection of the optimum target distribution strategy.
2 cl, 5 dwg
FIELD: information technology.
SUBSTANCE: method creating an audio scene for an avatar in a virtual environment comprises the following steps: creating a link structure in a virtual environment between a plurality of avatars; reproducing an audio scene for each avatar based on its connection with other avatars connected by the links; wherein the created link structure is configured to determine the angle for reproducing the audio scene and/or the attenuation coefficient for applying to audio streams on input links. The angle for reproducing the audio scene corresponds to angles of links between said each avatar and other avatars connected by links; the link structure includes a minimum spanning tree. Loops are introduced into the minimum spanning tree such that the minimum length of the loops is shorter than a predetermined value so as to prevent echo in the reproduced audio scenes.
EFFECT: solving a task such as creating voices which really seem to originate from avatars in a virtual environment.
12 cl, 6 dwg
FIELD: information technology.
SUBSTANCE: information on unit indicators of compared means is switched, recorded in a first memory unit, sent to a worst quality and best quality reference forming unit, which forms the corresponding beginning and end of a straight line which defines a quality estimation scale; planes perpendicular to that straight line are made through points of the compared means in the space of the unit indicators; parameters of the points of intersection with the estimation scale are found, values of which form complex quality indicators of the compared means, the maximum value of one of which corresponds to the preferred means.
EFFECT: high security of devices.
2 cl, 2 dwg
FIELD: information technology.
SUBSTANCE: system for hosting interactive audio/video (A/V) streaming with short waiting time includes a plurality of servers on which one or more applications are executed. The system also includes a network with input routing, which receives packet streams from users and routes these packets to one or more said servers, wherein said packet streams include user control signal input, wherein one or more said servers is configured to calculate A/V data in response to user control signal input. Furthermore, the system includes a compressing unit which is connected to receive A/V data from one or more servers and derive therefrom streaming compressed A/V data with short waiting time. The system also includes an output routing network which routes streaming compressed A/V data with short waiting time to each user over a communication channel through an interface.
EFFECT: high quality of A/V data transmitted over a communication channel.
29 cl, 40 dwg
FIELD: message boards and mail servers.
SUBSTANCE: electronic message board is provided with database in form of several known words, which are selected in specific order, while each word is connected to respective URI. Message text from user computer is checked using a plurality of known words. When message text does not include a known word of plurality of known words, message is placed at electronic board. Each known word is found in text, known in text is converted to hypertext format with URI connected to word, as destination of link, and message is placed at message board.
EFFECT: higher efficiency.
7 cl, 4 dwg
SUBSTANCE: device has control trigger, random pulse generators, block for forming program of functioning of modeled multimode system, working modes and technological mode blocks, operation time counters, random pulses generators, OR block, orders counters.
EFFECT: broader functional capabilities.
SUBSTANCE: device has matrix of m rows and n columns for homogenous environment, maximum detection block, adder, memory block, n blocks for counting units, block for estimating channels load levels, containing pulse generator, element selection multiplexer, element selection decoder, row selection decoder, m OR elements, m triggers, m counters of channel load, row number counter, column number counter, group of m blocks of forbidding elements.
EFFECT: broader functional capabilities.
SUBSTANCE: method includes detection of connection of user computer to Web-site of sub-domain on national language and selects service of registration of domain name on national language, performing software extension for automated forming of combination of symbols of English alphabet, matching domain name, based on national language, determining, whether such combination of English symbols was registered before as existing domain name, and, if not, then it is registered as domain name.
EFFECT: higher efficiency.
4 cl, 7 dwg
FIELD: computer science.
SUBSTANCE: device has random time ranges generators, imitating specific usage modes, elements AND, OR, triggers, delay elements, random numbers generators, decrypters and differentiative elements, providing for modeling of dynamics and specifics of operation of surface mobile measuring complex.
EFFECT: higher precision, broader functional capabilities.
FIELD: computer science.
SUBSTANCE: device has input registers, NOT elements, comparison blocks, counters, indication blocks, delay elements, adders, division blocks, Or elements, commutators, subtraction blocks.
EFFECT: broader functional capabilities, higher efficiency.
FIELD: measuring equipment.
SUBSTANCE: device has harmonic signals generator, synchronization pulse generator, counter, rectangular pulse generator, key, quadrature demodulator block, digital block for adjusting synchronization phase, analog-digital generator of tone frequencies signals, three ADC, three buffer registers, three digital filters, five multiplexers for temporal division, six arithmetical subtracter-adders, six arithmetical multiplication blocks with accumulation, microprocessor set with input and output data registers, data processing block, micro-programmed control block and synchronous pulse generator and indication block.
EFFECT: higher precision, higher efficiency, broader functional capabilities.
SUBSTANCE: method includes analog-digital conversion of reflected from targets and received signal, calculating complex correlation sums of selection of received signal and support quadrature signals with values of parameter of resolution of support signal, taken on e even mesh, maximal by width intervals of values of resolution parameter, inside which all modules of correlation sums exceed threshold of detection, decision is taken about match of each local maximum to one target in the ranges, in which number of local maximums is more than one, width of range is calculated, inside which one local maximum is placed, decision about match of one local maximum to two targets is taken in case, if width of range is more than threshold width, in opposite case minimal non-square non-match of counts of complex correlation sums and count s of standard correlation sums of signal of one target are calculated, and decision is taken about match of local maximum inside range of one target in case, if non-match is less than non-match threshold, and two targets - in opposite case.
EFFECT: higher efficiency.
FIELD: equipment characteristics prognosis technologies.
SUBSTANCE: device provides forming of statistical model for prognosis of characteristics of equipment. Device gets input data, in form of equipment parameter, which includes multiple values, appropriate for parameter. Input data is inputted into model and data set is formed, appropriate for model response to input data, equations system if formed being a model of equipment characteristic, received data is statistically processed for forming probability image of equipment characteristic.
EFFECT: higher efficiency.
6 cl, 4 dwg
FIELD: computer science.
SUBSTANCE: device has two registers blocks, inputs of which are device parameters inputs, pulses multiplication block, four multiplication blocks, comparator, clock pulses generator, adder block, two subtraction blocks, block for multiplication by zero, counter, division block, integrator and register.
EFFECT: broader functional capabilities.