18085475. TECHNIQUES FOR RUNTIME PROTOCOL CONFORMANCE CACHE FOR THIRD PARTY APPLICATIONS simplified abstract (Apple Inc.)

From WikiPatents
Jump to navigation Jump to search

TECHNIQUES FOR RUNTIME PROTOCOL CONFORMANCE CACHE FOR THIRD PARTY APPLICATIONS

Organization Name

Apple Inc.

Inventor(s)

Mohamadou A. Abdoulaye of San Francisco CA (US)

Peter Cooper of San Jose CA (US)

Michael J. Ash of McLean VA (US)

Davide Italiano of San Francisco CA (US)

Nick Kledzik of CUPERTINO CA (US)

TECHNIQUES FOR RUNTIME PROTOCOL CONFORMANCE CACHE FOR THIRD PARTY APPLICATIONS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18085475 titled 'TECHNIQUES FOR RUNTIME PROTOCOL CONFORMANCE CACHE FOR THIRD PARTY APPLICATIONS

Simplified Explanation

The abstract describes a technique for performing conformance checks on variable types and protocols in an electronic device. Here are the key points:

  • The technique involves receiving a request for a conformance check for a specific variable type and protocol.
  • A first pointer is identified in the request.
  • The technique checks if the conformance check result is already cached for the given variable type and protocol using the first pointer.
  • If the result is not cached, the conformance check is performed and the result is stored in an index table in persistent memory, associated with a portion of bits in the first pointer.
  • The index table is referenced for subsequent requests for conformance checks.

Potential applications of this technology:

  • This technique can be used in electronic devices that need to perform conformance checks for variable types and protocols, such as network devices, communication systems, or software applications.
  • It can be particularly useful in systems where conformance checks need to be performed frequently and efficiently.

Problems solved by this technology:

  • The technique solves the problem of having to perform conformance checks repeatedly for the same variable type and protocol, by caching the results and referencing them for subsequent requests.
  • It also solves the problem of efficiently storing and retrieving the conformance check results by associating them with a portion of bits in the first pointer.

Benefits of this technology:

  • By caching the conformance check results, the technique improves the efficiency and speed of subsequent conformance checks.
  • Storing the results in an index table allows for quick and easy retrieval, reducing the processing time required for conformance checks.
  • The technique optimizes the use of memory by associating the results with a portion of bits in the first pointer, minimizing the storage requirements.


Original Abstract Submitted

Techniques may include receiving a first request for a conformance check for a conformance pair, the conformance pair include a variable type and a particular protocol. The first request can identifying a first pointer. The technique can include determining a conformance check result is not cached for the conformance pair using the first pointer. In response to determining that the conformance check result is not cached for a variable, the electronic device may include performing the conformance check for the conformance pair and storing a result of the conformance check in an index table in persistent memory in association with at least a portion of bits in the first pointer. The technique can include referencing the index table on subsequent requests for a conformance check.