Resource authorizations dependent on emulation environment isolation policies

ABSTRACT

A system, method, computer program product, and carrier are described for obtaining a resource authorization dependent upon apparent compliance with a policy of causing an emulation environment to isolate a first software object type from a second software object type and signaling a decision whether to comply with the policy of causing the emulation environment to isolate the first software object type from the second software object type.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is related to and claims the benefit of theearliest available effective filing date(s) from the following listedapplication(s) (the “Related Applications”) (e.g., claims earliestavailable priority dates for other than provisional patent applicationsor claims benefits under 35 USC §119(e) for provisional patentapplications, for any and all parent, grandparent, great-grandparent,etc. applications of the Related Application(s)).

RELATED APPLICATIONS

For purposes of the USPTO extra-statutory requirements, the presentapplication constitutes a continuation-in-part of U.S. patentapplication Ser. No. 11/728.269, entitled COORDINATING INSTANCES OF ATHREAD OR OTHER SERVICE IN EMULATION, naming Alexander J. Cohen, EdwardK. Y. Jung, Royce A. Levien, Robert W. Lord, Mark A. Malamud, John D.Rinaldo, Jr. and Lowell L. Wood, Jr. as inventors, filed 22 Mar. 2007,which is currently co-pending, or is an application of which a currentlyco-pending application is entitled to the benefit of the filing date.

For purposes of the USPTO extra-statutory requirements, the presentapplication constitutes a continuation-in-part of U.S. patentapplication Ser. No. 11/728.312, entitled IMPLEMENTING SECURITY CONTROLPRACTICE OMISSION DECISIONS FROM SERVICE EMULATION, naming Alexander J.Cohen, Edward K. Y. Jung, Royce A. Levien, Robert W. Lord, Mark A.Malamud, John D. Rinaldo, Jr. and Lowell L. Wood, Jr. as inventors,filed 22 Mar. 2007, which is currently co-pending, or is an applicationof which a currently co-pending application is entitled to the benefitof the filing date.

For purposes of the USPTO extra-statutory requirements, the presentapplication constitutes a continuation-in-part of U.S. patentapplication Ser. No. 11/728,268, entitled IMPLEMENTINGPERFORMANCE-DEPENDENT TRANSFER OR EXECUTION DECISIONS FROM SERVICEEMULATION INDICATIONS, naming Alexander J. Cohen, Edward K. Y. Jung,Royce A. Levien, Robert W. Lord, Mark A. Malamud, John D. Rinaldo, Jr.and Lowell L. Wood, Jr. as inventors, filed 22 Mar. 2007, which iscurrently co-pending, or is an application of which a currentlyco-pending application is entitled to the benefit of the filing date.

For purposes of the USPTO extra-statutory requirements, the presentapplication constitutes a continuation-in-part of U.S. patentapplication Ser. No. 11/728,314, entitled IMPLEMENTING EMULATIONDECISIONS IN RESPONSE TO SOFTWARE EVALUATIONS OR THE LIKE, namingAlexander J. Cohen, Edward K. Y. Jung, Royce A. Levien, Robert W. Lord,Mark A. Malamud, John D. Rinaldo, Jr. and Lowell L. Wood, Jr. asinventors, filed 22 Mar. 2007, which is currently co-pending, or is anapplication of which a currently co-pending application is entitled tothe benefit of the filing date.

The United States Patent Office (USPTO) has published a notice to theeffect that the USPTO's computer programs require that patent applicantsreference both a serial number and indicate whether an application is acontinuation or continuation-in-part. Stephen G. Kunin, Benefit ofPrior-Filed Application, USPTO Official Gazette Mar. 18, 2003. Thepresent Applicant Entity (hereinafter “Applicant”) has provided above aspecific reference to the application(s) from which priority is beingclaimed as recited by statute. Applicant understands that the statute isunambiguous in its specific reference language and does not requireeither a serial number or any characterization, such as “continuation”or “continuation-in-part,” for claiming priority to U.S. patentapplications. Notwithstanding the foregoing, Applicant understands thatthe USPTO's computer programs have certain data entry requirements, andhence Applicant is designating the present application as acontinuation-in-part of its parent applications as set forth above, butexpressly points out that such designations are not to be construed inany way as any type of commentary and/or admission as to whether or notthe present application contains any new matter in addition to thematter of its parent application(s).

All subject matter of the Related Applications and of any and allparent, grandparent, great-grandparent, etc. applications of the RelatedApplications is incorporated herein by reference to the extent suchsubject matter is not inconsistent herewith.

SUMMARY

In one aspect, a method includes but is not limited to obtaining asoftware flaw indication resulting from an emulation of a first instanceof a thread at least partly in response to a first input from a userinterface and manipulating a second instance of the thread at leastpartly in response to a second input arriving from the user interfaceafter beginning the emulation of the first instance of the thread. Inaddition to the foregoing, other method aspects are described in theclaims, drawings, and text forming a part of the present disclosure.

In one or more various aspects, related systems include but are notlimited to circuitry and/or programming for effecting theherein-referenced method aspects; the circuitry and/or programming canbe virtually any combination of hardware, software, and/or firmwareconfigured to effect the herein-referenced method aspects depending uponthe design choices of the system designer.

In one aspect, a system includes but is not limited to circuitry forobtaining a software flaw indication resulting from an emulation of afirst instance of a thread at least partly in response to a first inputfrom a user interface and circuitry for manipulating a second instanceof the thread at least partly in response to a second input arrivingfrom the user interface after beginning the emulation of the firstinstance of the thread. In addition to the foregoing, other systemaspects are described in the claims, drawings, and text forming a partof the present disclosure.

In one aspect, a method includes but is not limited to indicating avirtually instantiated service via a data flow between a user interfaceand an operating system, the virtually instantiated service including atleast a virtual instance and accessing another instance of the virtuallyinstantiated service at least partly in response to the user interfaceafter indicating the virtually instantiated service via the data flowbetween the user interface and the operating system. In addition to theforegoing, other method aspects are described in the claims, drawings,and text forming a part of the present disclosure.

In one or more various aspects, related systems include but are notlimited to circuitry and/or programming for effecting theherein-referenced method aspects; the circuitry and/or programming canbe virtually any combination of hardware, software, and/or firmwareconfigured to effect the herein-referenced method aspects depending uponthe design choices of the system designer.

In one aspect, a system includes but is not limited to circuitry forindicating a virtually instantiated service via a data flow between auser interface and an operating system, the virtually instantiatedservice including at least a virtual instance and circuitry foraccessing another instance of the virtually instantiated service atleast partly in response to the user interface after indicating thevirtually instantiated service via the data flow between the userinterface and the operating system. In addition to the foregoing, othersystem aspects are described in the claims, drawings, and text forming apart of the present disclosure.

In one aspect, a method includes but is not limited to obtaining aresource authorization dependent upon apparent compliance with a policyof causing an emulation environment to isolate a first software objecttype from a second software object type and signaling a decision whetherto comply with the policy of causing the emulation environment toisolate the first software object type from the second software objecttype. In addition to the foregoing, other method aspects are describedin the claims, drawings, and text forming a part of the presentdisclosure.

In one or more various aspects, related systems include but are notlimited to circuitry and/or programming for effecting theherein-referenced method aspects; the circuitry and/or programming canbe virtually any combination of hardware, software, and/or firmwareconfigured to effect the herein-referenced method aspects depending uponthe design choices of the system designer.

In one aspect, a system includes but is not limited to circuitry forobtaining a resource authorization dependent upon apparent compliancewith a policy of causing an emulation environment to isolate a firstsoftware object type from a second software object type and circuitryfor signaling a decision whether to comply with the policy of causingthe emulation environment to isolate the first software object type fromthe second software object type. In addition to the foregoing, othersystem aspects are described in the claims, drawings, and text forming apart of the present disclosure.

In one aspect, a method includes but is not limited to obtaining anindication of an emulation of a service in a first environment with afirst security control practice and signaling a decision whether to usea second environment without the first security control practice inperforming at least a portion of the service as a result of theindication of the emulation of the service in the first environment withthe first security control practice. In addition to the foregoing, othermethod aspects are described in the claims, drawings, and text forming apart of the present disclosure.

In one or more various aspects, related systems include but are notlimited to circuitry and/or programming for effecting theherein-referenced method aspects; the circuitry and/or programming canbe virtually any combination of hardware, software, and/or firmwareconfigured to effect the herein-referenced method aspects depending uponthe design choices of the system designer.

In one aspect, a system includes but is not limited to circuitry forobtaining an indication of an emulation of a service in a firstenvironment with a first security control practice and circuitry forsignaling a decision whether to use a second environment without thefirst security control practice in performing at least a portion of theservice as a result of the indication of the emulation of the service inthe first environment with the first security control practice. Inaddition to the foregoing, other system aspects are described in theclaims, drawings, and text forming a part of the present disclosure.

In one aspect, a method includes but is not limited to obtaining one ormore gradational norms of software performance in an emulationenvironment and signaling a decision whether to allow a software objectto execute in another environment at least partly as a result of whetherthe software object apparently performed in conformity with the one ormore gradational norms of software performance in the emulationenvironment. In addition to the foregoing, other method aspects aredescribed in the claims, drawings, and text forming a part of thepresent disclosure.

In one or more various aspects, related systems include but are notlimited to circuitry and/or programming for effecting theherein-referenced method aspects; the circuitry and/or programming canbe virtually any combination of hardware, software, and/or firmwareconfigured to effect the herein-referenced method aspects depending uponthe design choices of the system designer.

In one aspect, a system includes but is not limited to circuitry forobtaining one or more gradational norms of software performance in anemulation environment and circuitry for signaling a decision whether toallow a software object to execute in another environment at leastpartly as a result of whether the software object apparently performedin conformity with the one or more gradational norms of softwareperformance in the emulation environment. In addition to the foregoing,other system aspects are described in the claims, drawings, and textforming a part of the present disclosure.

In one aspect, a method includes but is not limited to obtaining datafrom a first emulator and from a first emulation environment hostingsoftware and signaling a decision whether to transfer any of the data toa second emulator at least partly as a result of the first emulationenvironment hosting the software. In addition to the foregoing, othermethod aspects are described in the claims, drawings, and text forming apart of the present disclosure.

In one or more various aspects, related systems include but are notlimited to circuitry and/or programming for effecting theherein-referenced method aspects; the circuitry and/or programming canbe virtually any combination of hardware, software, and/or firmwareconfigured to effect the herein-referenced method aspects depending uponthe design choices of the system designer.

In one aspect, a system includes but is not limited to circuitry forobtaining data from a first emulator and from a first emulationenvironment hosting software and circuitry for signaling a decisionwhether to transfer any of the data to a second emulator at least partlyas a result of the first emulation environment hosting the software. Inaddition to the foregoing, other system aspects are described in theclaims, drawings, and text forming a part of the present disclosure.

In one aspect, a method includes but is not limited to obtaining adecision whether to host an instruction sequence in an emulationenvironment at least in response to an evaluation of software containingthe instruction sequence and causing another environment to host theinstruction sequence in response to the decision whether to host theinstruction sequence in the emulation environment. In addition to theforegoing, other method aspects are described in the claims, drawings,and text forming a part of the present disclosure.

In one or more various aspects, related systems include but are notlimited to circuitry and/or programming for effecting theherein-referenced method aspects; the circuitry and/or programming canbe virtually any combination of hardware, software, and/or firmwareconfigured to effect the herein-referenced method aspects depending uponthe design choices of the system designer.

In one aspect, a system includes but is not limited to circuitry forobtaining a decision whether to host an instruction sequence in anemulation environment at least in response to an evaluation of softwarecontaining the instruction sequence and circuitry for causing anotherenvironment to host the instruction sequence in response to the decisionwhether to host the instruction sequence in the emulation environment.In addition to the foregoing, other system aspects are described in theclaims, drawings, and text forming a part of the present disclosure.

In one aspect, a method includes but is not limited to obtaining adecision whether to host an instruction sequence natively in a physicalenvironment in response to an operational history of software apparentlycontaining the instruction sequence and signaling a decision whether tocause an emulation environment to host the instruction sequence inresponse to the decision whether to host the instruction sequencenatively in the physical environment. In addition to the foregoing,other method aspects are described in the claims, drawings, and textforming a part of the present disclosure.

In one or more various aspects, related systems include but are notlimited to circuitry and/or programming for effecting theherein-referenced method aspects; the circuitry and/or programming canbe virtually any combination of hardware, software, and/or firmwareconfigured to effect the herein-referenced method aspects depending uponthe design choices of the system designer.

In one aspect, a system includes but is not limited to circuitry forobtaining a decision whether to host an instruction sequence natively ina physical environment in response to an operational history of softwareapparently containing the instruction sequence and circuitry forsignaling a decision whether to cause an emulation environment to hostthe instruction sequence in response to the decision whether to host theinstruction sequence natively in the physical environment. In additionto the foregoing, other system aspects are described in the claims,drawings, and text forming a part of the present disclosure.

In addition to the foregoing, various other method and/or system and/orprogram product and/or physical carrier aspects are set forth anddescribed in the teachings such as text (e.g., claims and/or detaileddescription) and/or drawings of the present disclosure.

The foregoing is a summary and thus contains, by necessity,simplifications, generalizations and omissions of detail; consequently,those skilled in the art will appreciate that the summary isillustrative only and is NOT intended to be in any way limiting. Otheraspects, features, and advantages of the devices and/or processes and/orother subject matter described herein will become apparent in theteachings set forth herein.

BRIEF DESCRIPTION OF THE FIGURES

FIG. 1 depicts an exemplary environment in which one or moretechnologies may be implemented.

FIG. 2 depicts a high-level logic flow of an operational process.

FIG. 3 depicts an exemplary environment in which one or moretechnologies may be implemented.

FIG. 4 depicts a high-level logic flow of an operational process.

FIG. 5 depicts an exemplary environment in which one or moretechnologies may be implemented.

FIG. 6 depicts a high-level logic flow of an operational process.

FIG. 7 depicts an exemplary environment in which one or moretechnologies may be implemented.

FIG. 8 depicts a high-level logic flow of an operational process.

FIG. 9 depicts an exemplary environment in which one or moretechnologies may be implemented.

FIG. 10 depicts a high-level logic flow of an operational process.

FIG. 11 depicts an exemplary environment in which one or moretechnologies may be implemented.

FIG. 12 depicts a high-level logic flow of an operational process.

FIG. 13 depicts an exemplary environment in which one or moretechnologies may be implemented.

FIG. 14 depicts a high-level logic flow of an operational process.

FIG. 15 depicts an exemplary environment in which one or moretechnologies may be implemented.

FIG. 16 depicts a high-level logic flow of an operational process.

FIGS. 17-32 depict other exemplary environments in each of which one ormore technologies may be implemented.

FIGS. 33-34 depict variants of the flow of FIG. 2.

FIG. 35 depicts variants of the flow of FIG. 4.

FIGS. 36-38 depict variants of the flow of FIG. 6.

FIGS. 39-40 depict variants of the flow of FIG. 8.

FIG. 41 depicts variants of the flow of FIG. 10.

FIGS. 42-44 depict variants of the flow of FIG. 12.

FIGS. 45-46 depict variants of the flow of FIG. 14.

FIG. 47 depicts variants of the flow of FIG. 16.

DETAILED DESCRIPTION

Those having skill in the art will recognize that the state of the arthas progressed to the point where there is little distinction leftbetween hardware and software implementations of aspects of systems; theuse of hardware or software is generally (but not always, in that incertain contexts the choice between hardware and software can becomesignificant) a design choice representing cost vs. efficiency tradeoffs.Those having skill in the art will appreciate that there are variousvehicles by which processes and/or systems and/or other technologiesdescribed herein can be effected (e.g., hardware, software, and/orfirmware), and that the preferred vehicle will vary with the context inwhich the processes and/or systems and/or other technologies aredeployed. For example, if an implementer determines that speed andaccuracy are paramount, the implementer may opt for a mainly hardwareand/or firmware vehicle; alternatively, if flexibility is paramount, theimplementer may opt for a mainly software implementation; or, yet againalternatively, the implementer may opt for some combination of hardware,software, and/or firmware. Hence, there are several possible vehicles bywhich the processes and/or devices and/or other technologies describedherein may be effected, none of which is inherently superior to theother in that any vehicle to be utilized is a choice dependent upon thecontext in which the vehicle will be deployed and the specific concerns(e.g., speed, flexibility, or predictability) of the implementer, any ofwhich may vary. Those skilled in the art will recognize that opticalaspects of implementations will typically employ optically-orientedhardware, software, and or firmware.

In the following detailed description, reference is made to theaccompanying drawings, which form a part hereof. The use of the samesymbols in different drawings typically indicates similar or identicalitems. The illustrative embodiments described in the detaileddescription, drawings, and claims are not meant to be limiting. Otherembodiments may be utilized, and other changes may be made, withoutdeparting from the spirit or scope of the subject matter presented here.

Following are a series of systems and flowcharts depictingimplementations of processes. For ease of understanding, the flowchartsare organized such that the initial flowcharts present implementationsvia an initial “big picture” viewpoint and thereafter the followingflowcharts present alternate implementations and/or expansions of the“big picture” flowcharts as either sub-steps or additional stepsbuilding on one or more earlier-presented flowcharts. Those having skillin the art will appreciate that the style of presentation utilizedherein (e.g., beginning with a presentation of a flowchart(s) presentingan overall view and thereafter providing additions to and/or furtherdetails in subsequent flowcharts) generally allows for a rapid and easyunderstanding of the various process implementations. In addition, thoseskilled in the art will further appreciate that the style ofpresentation used herein also lends itself well to modular and/orobject-oriented program design paradigms.

With reference now to FIG. 1, shown is an example of a system that mayserve as a context for introducing one or more processes and/or devicesdescribed herein. As shown system 100 is operable to communicate withnetwork 190, which can include user interface 180 accessible to user133. System 100 can include one or more instances of interfaces 140,sensors 150, processors 170, or threads 160. Interface 140 can,optionally and at various times, handle one or more of input 141, input142, or warning 143. Thread 160 can likewise include instances 161, 162as described below. (In some embodiments, a thread, sequence,application, session, or similar object can have two or more “instances”that are functionally identical but may have differences in instanceidentity, progress status, location, set membership, policy context, orthe like.)

With reference now to FIG. 2, there is shown a high-level logic flow 200of an operational process. Flow 200 includes operation 220—obtaining asoftware flaw indication resulting from an emulation of a first instanceof a thread at least partly in response to a first input from a userinterface (e.g. sensor 150 generating an indication 143 of an error orthe like from instance 161 of thread 160 being executed by emulationunder external control). The emulation itself can be in response toreceived input 141 resulting, in some instances, from a task request orthe like originating at user interface 180. The software flaw indicationcan take any of many forms, and can optionally include other informationsuch as an event type or time.

Flow 200 further includes operation 280—manipulating a second instanceof the thread at least partly in response to a second input arrivingfrom the user interface after beginning the emulation of the firstinstance of the thread (e.g. processor 170 creating, switching to,deleting, or otherwise acting upon another instance 162 of thread 160 inresponse to input 142). In some embodiments, for example, input 142 canbe received as user data that user interface 180 merely transmits tointerface 140. (In some embodiments, an item selection or other decisioncan occur “in response to” one or more of a prior or contemporaneousmeasurement, decision, transition, circumstance, or other determinant.Any such decision may likewise depend upon one or more other prior,contemporaneous, or potential determinants, in various implementationsas taught herein.) Further examples are provided below, particularly indescriptions relating to FIGS. 33-35.

With reference now to FIG. 3, shown is an example of a system that mayserve as a context for introducing one or more processes and/or devicesdescribed herein. As shown primary system 330 can be accessible to user333 via (optional) user interface 380, and is operatively coupled withremote system 360. Remote system 360 can include one or more of hostingmodule 310, feedback module 370, or access module 390. Hosting module310 can include one or more of emulator 311, operating system 320,service 340, or instances 341, 342 thereof. Hosting module 310 can becoupled with (at least operating system 320 of) remote system 360 viadata flow 335 in either or both directions.

With reference now to FIG. 4, there is shown a high-level logic flow 400of an operational process. Flow 400 includes operation 430—indicating avirtually instantiated service via a data flow between a user interfaceand an operating system, the virtually instantiated service including atleast a virtual instance (e.g. feedback module 370 indicating service340 via flow 335 between operating system 320 and user interface 380).Emulator 311 can emulate (virtual) instance 341 of service 340, forexample.

Flow 400 further includes operation 440—accessing another instance ofthe virtually instantiated service at least partly in response to theuser interface after indicating the virtually instantiated service viathe data flow between the user interface and the operating system (e.g.access module 390 accessing another instance 342 of service 340 inresponse to user interface 380 after performing operation 440 at leastpartially, for example). Such access can occur in response to a messageflow to user interface 380, for example, in response to a command flowfrom user 333, or in response to some later event enabled by such flow.In some variants, one or more of the instances 341, 342 can reside inprimary system 330 or otherwise local to user 333, especially in anetwork embodiment in which the service is distributed. Further examplesare provided below, particularly in descriptions relating to FIGS.33-35.

With reference now to FIG. 5, shown is an example of a system that mayserve as a context for introducing one or more processes and/or devicesdescribed herein. As shown primary system 500 includes processor 572 andcan include one or more of additional processor(s) 582, environments574, 584, media 540, or port 533. Primary system 500 can likewise obtainone or more of controller 525 (e.g. within resource 520) or decision 518(e.g. within signaling circuitry 510). Media 540 can include one or moredefinitions 543 or instances 547. Primary system 500 can be linked toone or more external system 550, which can be configured to obtainresource authorization 555 such as is described below. Environment 574can include one or more of policies 578 or sequence(s) 579, andenvironment 584 can likewise include one or more of policies 588 orsequence(s) 589.

In some embodiments, an “environment” can include one or more primaryhardware elements (e.g. a processor or its working space) and one ormore primary software elements (e.g. a library module or otherinstruction sequences). An environment can contain other environments ascomponents, some or all of which may be implemented virtually orphysically, in some embodiments. Alternatively or additionally, some orall such components may be duplicated or otherwise adaptively spawned toimplement embodiments as described herein.

With reference now to FIG. 6, there is shown a high-level logic flow 600of an operational process. Flow 600 includes operation 680—obtaining aresource authorization dependent upon apparent compliance with a policyof causing an emulation environment to isolate a first software objecttype from a second software object type (e.g. port 533 receiving anexternal resource authorization 555 specifying a conditional access to aresource). Alternatively or additionally, a local access controller 525can limit access to part or all of a local resource 520 with a similarapparent-compliance-dependent resource authorization—optionallyimplemented as device-executable code or other instruction sequence.Such access can depend upon one or more of a monitoring system output, auser input, a system-wide policy, or some other manifestation ofapparent compliance, for example, with a policy of isolating some typesof target software through emulation. The software object types can bedefined by one or more definitions 543, optionally in a context in whichmedia 540 contain one or more instances 547 of each defined type. Theisolation mode(s) can function in any of several ways, mutual orotherwise, as described below.

Flow 600 further includes operation 690—signaling a decision whether tocomply with the policy of causing the emulation environment to isolatethe first software object type from the second software object type(e.g. signaling circuitry 510 signaling decision 518 relating to whetherthe isolation policy will be used by an emulation environment). In someembodiments, “isolation policies” can be associated selectively withcertain resources or resource types, at least partly protecting orconstraining them from harmful interactions with other items or eachother. Those skilled in the art will recognize a variety of suchpolicies exemplified in these teachings and can readily implement otherswithout undue experimentation. Processor 572 can signal such compliance,for example, by including such a policy in policies 578 of emulationenvironment 574. A negative decision can likewise be signaled bynoncompliance, a failure to include any such policy, by routing thepolicy or resource authorization to another environment, or the like. Insome variants, one or more other processors 582 are configured for oneor more of monitoring processor 572, implementing an isolation policy,generating the decision whether to comply with the policy, or the like.Further examples are provided below, particularly in descriptionsrelating to FIGS. 36-38.

With reference now to FIG. 7, shown is an example of a system that mayserve as a context for introducing one or more processes and/or devicesdescribed herein. As shown primary system 710 can include one or moreinstances of indications 793 (at port 790, e.g.), decisions 725 (atprocessor 720, e.g.), memories 771, processors 773, or services 778 (ofenvironment 777, e.g.). As shown, primary system 710 is operativelycoupled to at least external system 740, which can include environment767 with one or more of memory 761, processor 763, practice 764, service765, or service 766.

With reference now to FIG. 8, there is shown a high-level logic flow 800of an operational process. Flow 800 includes operation 840—obtaining anindication of an emulation of a service in a first environment with afirst security control practice (e.g. port 790 receiving indication 793of services 765, 766 executing in emulation environment 767 at leastwith security control practice 764). In some embodiments, a “securitycontrol practice” can include any data handling, resource control,authorization or other physical or emulated protocols of an environmentthat helps assure the integrity of data, instructions, or behaviors ofsoftware objects functioning normally within the environment. Practice764 may preclude certain transactions or limit permissible activities ofvirtual processor 763 or with virtual memory 761, for example. (In someembodiments, a thing's “emulation” can refer to the thing emulating orbeing emulated as an occurrence, manner, efficiency, outcome, etc.)

Flow 800 further includes operation 880—signaling a decision whether touse a second environment without the first security control practice inperforming at least a portion of the service as a result of theindication of the emulation of the service in the first environment withthe first security control practice (e.g. processor 720 acting upon ortransmitting decision 725 to perform one or more services 765, 766without security control practice 764). In some embodiments, decidingwhether to take an action “as a result of” one or more determinants canresult in the action, or in no action, depending upon thedeterminant(s). Alternatively or additionally, such a decision canresult in a provisional, final, or hybrid resolution for later uses:implementation, confirmation, transmission, recordation, analysis or thelike.

In various embodiments, the decision can specify one or more of whichservice(s) to perform, which portion(s) to perform, which environment(s)to use, which practice(s) to use, whether or when to proceed with aspecific configuration, what other conditions might warrant a delay, orthe like. In some variants, an affirmative decision may be warranted bythe emulation encountering one or more of (a) a substantial performanceloss or other cost apparently resulting from implementing the practice;(b) a problem that the practice does not solve; (c) an opportunity tosubstitute an upgraded practice; or the like. For example, suchemulations can reflect an apparent or nominal incompatibility betweenthe practice and an element in the second environment: service 766 maybe incompatible with a type of memory 771, processor 773, or service 778in the “second” environment 777 under consideration. Further examplesare provided below, particularly in descriptions relating to FIGS.39-41.

With reference now to FIG. 9, shown is an example of a system that mayserve as a context for introducing one or more processes and/or devicesdescribed herein. As shown primary system 910 can include one or moreinstances of norm(s) 998 (at port 990, e.g.), decisions 925 (atprocessor 920, e.g.), memories 971, practices 974, or other objects 978(of environment 977, e.g.). As shown, primary system 910 is operativelycoupled to at least external system 940, which can include one or moreenvironment 987 each with one or more of memory 981, practice 984, orother object(s) 985.

With reference now to FIG. 10, there is shown a high-level logic flow1000 of an operational process. Flow 1000 includes operation1010—obtaining one or more gradational norms of software performance inan emulation environment (e.g. port 990 receiving one or more softwareperformance range limits, physical measurements, or other norm(s) 998from environment 987 of external system 940). In some embodiments, a“gradational norm” of performance can include one or more instances ofperformance metrics or other quotas, output ranges, resource usagelevels, completion times, performance trends, complaints or errorfrequencies, success ratios, analog voltages, or the like in associationwith some software configuration or other object. Alternatively oradditionally, gradational norms can include one or more ranges orthresholds against which an observed quantity can be compared. Suchnorms can be established by setting thresholds against which an emulatoror evaluation module, for example, can compare a performance metric.(The results of such comparisons, or other Boolean-type outcome values,can likewise be provided at operation 1010 and can affect the decisionof operation 1020, in some embodiments.)

Flow 1000 further includes operation 1020—signaling a decision whetherto allow a software object to execute in another environment at leastpartly as a result of whether the software object apparently performedin conformity with the one or more gradational norms of softwareperformance in the emulation environment (e.g. processor 920 signaling adecision 925 not to accept or not to execute object 985 in environment977 of primary system 910 based on an apparent failure of object 985 tomeet a minimum or maximum threshold in environment 977. This can occur,for example, in embodiments in which environment 977 is “the” emulationenvironment of operation 1010 and in which environment 987 comprises the“other” environment(s) of operation 1020. Alternatively or additionally,processor 920 can be configured to perform flow 1000 by deciding whetherto transmit or authorize object 978 for use in environment 987 at leastpartly as a result of whether object 978 apparently performed inconformity with the norm(s) while emulated in environment 977. In somevariants, the gradational norm(s) can likewise be derived or otherwiseobtained by a validation system to ensure compliance with a performancerequirement of a target system (e.g. external system 940). Furtherexamples are provided below, particularly in descriptions relating toFIGS. 39-41.

With reference now to FIG. 11, shown is an example of a system that mayserve as a context for introducing one or more processes and/or devicesdescribed herein. As shown primary system 1110 includes processor 1172and can include one or more instances of interfaces 1120, controlmodules 1130, environments 1174, 1184 (optionally containing respectiveinstances of software 1101), or data 1179, 1189 (optionally ofrespective emulators 1178, 1188, e.g., as shown). Interface 1120 can, insome circumstances, obtain or otherwise provide for one or more of dataportion 1123 or decision 1125. Control module 1130 can likewiseoptionally contain filter 1131. As shown primary system 1110 is(directly or indirectly) operatively coupled with external system 1140,within which one or more of environment 1144 or emulator 1148 can resideand operate as described below.

With reference now to FIG. 12, there is shown a high-level logic flow1200 of an operational process. Flow 1200 includes operation1210—obtaining data from a first emulator and from a first emulationenvironment hosting software (e.g. filter 1131 obtaining data 1189 fromemulator 1188 and from emulation environment—1184 hosting a programmodule or some other software 1101). Filter 1131 or other parts ofcontrol module 1130 can use this information effectively to distill dataportion 1123 or decision 1125 as described herein, such as by presentingintermediate or final emulation data for a user to decide whether toproceed with a debugging effort, a process characterization, or thelike.

Flow 1200 further includes operation 1270—signaling a decision whetherto transfer any of the data to a second emulator at least partly as aresult of the first emulation environment hosting the software (e.g.interface 1120 manifesting such a decision 1125 by sending at least somedata 1189 originally from emulation environment 1184 hosting software1101 to emulator 1148 or emulator 1178). This information can be useful,for example, in a circumstance in which the data is received by anemulator that has executed or might execute the same software: emulator1178 executing software 1101 in environment 1174, for example. Furtherexamples are provided below, particularly in descriptions relating toFIGS. 42-44.

With reference now to FIG. 13, shown is an example of a system that mayserve as a context for introducing one or more processes and/or devicesdescribed herein. As shown primary system 1310 is operatively coupledwith external system 1340. Primary system 1310 includes processor 1372,and can include one or more of interface 1320, decision module 1330,processor 1382, environment 1374, or environment 1384. Interface 1320can optionally handle one or more of evaluation 1323 or decision 1325 asdescribed below. Decision module 1330 or external system 1340 can each(optionally) include one or more instances of evaluation modules 1350.Environment 1374 can include one or more instances of instructionsequence 1301, as can environment 1384.

With reference now to FIG. 14, there is shown a high-level logic flow1400 of an operational process. Flow 1400 includes operation1460—obtaining a decision whether to host an instruction sequence in anemulation environment at least in response to an evaluation of softwarecontaining the instruction sequence (e.g. decision module 1330 decidingthat environment 1374 will host instruction sequence 1301 in response toan evaluation from evaluation module 1350 of at least sequence 1301).Alternatively, in some embodiments, interface 1320 can perform operation1460 by receiving decision 1325 externally (e.g. from external system1340).

In some embodiments, “evaluations” of software can include one or moreof a count of the errors detected within a nominal trial period, a meantime between failures, an empirically determined probability of aspecific fault type, or any other quantity substantially correlatingwith such fault rate indicators. (Variables correlate “substantially” ifa correlation coefficient between them has a magnitude of at least about0.4, in some embodiments herein.) Alternatively or additionally, modesof obtaining software evaluations from third parties or the like arewidely available and generally suitable for use with teachings hereinwithout undue experimentation. See, e.g., U.S. Pat. No. 7,065,680(“Method and a System for Evaluating the Reliability of a Program in anElectronic Device, and an Electronic Device”) filed 17 Jun. 2003. Thoseskilled in the art can recognize a great variety of workable variants ofthese modes using ordinary offsets, exponentiations, combinations ofthese, hybrid indices or the like, readily in light of these teachings.

Flow 1400 further includes operation 1480—causing another environment tohost the instruction sequence in response to the decision whether tohost the instruction sequence in the emulation environment (e.g.processor 1372 causing environment 1384 to host at least sequence 1301in response to decision 1325 or decision module 1330). In variousembodiments described herein, environment 1384 can include one or morecontained environments any of which can optionally be configured foremulation or for partly or fully native execution of sequence 1301 (e.g.by processor 1382). Further examples are provided below, particularly indescriptions relating to FIGS. 45-47.

With reference now to FIG. 15, shown is an example of a system that mayserve as a context for introducing one or more processes and/or devicesdescribed herein. As shown primary system 1510 is operatively coupledwith external system 1540. External system 1540 can (optionally) includeone or more of filter 1545 or monitoring module 1590. Primary system1510 includes processor 1572, and can include one or more of interface1520, decision module 1530, processor 1582, environment 1574, orenvironment 1584. Interface 1520 can optionally handle one or more ofdecision 1525 or evaluation 1529 as described below. Decision module canoptionally include monitoring module 1590. Environment 1574 can likewiseinclude one or more instances of instruction sequence 1501, as canenvironment 1584.

With reference now to FIG. 16, there is shown a high-level logic flow1600 of an operational process. Flow 1600 includes operation1640—obtaining a decision whether to host an instruction sequencenatively in a physical environment in response to an operational historyof software apparently containing the instruction sequence (e.g.decision module 1530 deciding that environment 1584 will host at leastinstruction sequence 1501 natively in response to an event seriesrelating at least partly to sequence 1501 signaled from a monitoringmodule 1590). In some variants, for example, the decision can depend onwhether the operational history exists or whether any part of itpertains to the sequence or software. Alternatively or additionally, insome embodiments, interface 1520 can perform operation 1640 by receivingdecision 1525 externally (e.g. from external system 1540). In somevariants, absent a dispositive circumstance arising from a history, thedecision can likewise depend on a reputation, a next performance, etc.

Flow 1600 further includes operation 1650—signaling a decision whetherto cause an emulation environment to host the instruction sequence inresponse to the decision whether to host the instruction sequencenatively in the physical environment (e.g. processor 1572 implementingor otherwise indicating a decision for environment 1574 to host at leastsequence 1501 in response to decision 1525 or decision module 1530). Invarious embodiments described herein, environment 1574 can include oneor more contained environments any of which can optionally be configuredfor emulation or for partly or fully native execution of sequence 1501(e.g. by other processor 1582). Further examples are provided below,particularly in descriptions relating to FIGS. 45-47.

With reference now to FIG. 17, shown is an example of a system that mayserve as a context for introducing one or more processes and/or devicesdescribed herein. As shown system 1700 includes hub 1720 (optionallyoperable to host sequence 1725 as described in one or more flows hereinand) coupled with one or more instances of modules 1702, 1704, 1706,1708, 1710, 1712, 1714, or 1716 as shown. In some variants, modules1702, 1704 can be mutually coupled directly, as shown. Alternatively oradditionally, modules 1708, 1710 can likewise be coupled directly withone another, as can modules 1714, 1716. In many contexts, system 1700can be implemented as one or more computer networks or entirely onto asingle common substrate such as a semiconductor chip. Moreover, in manycombinations described below, items in hub 1720 can be configured tointeract with, include, or otherwise relate to at least one singlecommon emulation (of sequence 1725, e.g.) therein, for example. System1700, as described below, can include configurations for combining someor all of flows 200, 400, 600, 800, 1000, 1200, 1400 above.

With reference now to FIG. 18, shown is an example of a system that mayserve as a context for introducing one or more processes and/or devicesdescribed herein. As shown system 1800 can include one or more instancesof monitoring modules 1803, control modules 1804, hosting modules 1806,or interfaces 1899. Monitoring module 1803 can include one or more ofaggregation manage 1831, error recovery logic 1832, fault detectionlogic 1837, flaw indication 1840, configuration logic 1850, disks 1882,event handler 1884, filter 1886, filter 1887, input 1890, timing 1892,parameters 1893, 1894, results 1895, checkpoints 1896, selections 1897,or the like. Flaw indication 1840 can include one or more of components1846, 1847, computation error indications 1849, call stack 1852,interaction history 1853, registry 1854, workspace contents 1855, otherstate information 1859, or the like. In some embodiments, “stateinformation” can include action sequences, transient or stable variablevalues, conditional determinations, storage configurations, dataaggregations, emulation environment changes, execution outcomes or thelike.

Some varieties of system 1800 can be implemented, for example, in system100 or network 190 of FIG. 1, in module 1702 or hub 1720 of FIG. 17, oras a stand-alone system. In some implementations, differently-configuredinstances of system 1800 can likewise operate cooperatively. If system1700 is configured with hub 1720 and module 1702 each implementing aninstance of system 1800, for example, monitoring module 1803 canoptionally reside entirely within hub 1720 and operate cooperativelywith an external instance of control module 1804 or hosting module 1806resident in module 1702. In such a case the external instance(s) ofsystem 1800 can, of course, exclude monitoring module 1803.

With reference now to FIG. 19, shown is an example of a system that mayserve as a context for introducing one or more processes and/or devicesdescribed herein. As shown system 1900 can include one or more instancesof control modules 1904, hosting modules 1906, code generators 1907,servers 1908, or data-handling media 1909. Code module 1904 can includeone or more instances of user interfaces 1980, drivers 1991,representations 1992, editors 1994, compilers 1995, ports 1996, 1997, ordata 1998. User interface 1980 can optionally handle inputs 1981, 1982at input device 1985 or have an output device 1986 in some instanceswith a display 1987 operable to show at least one image 1988 with one ormore icons 1989 as described herein. Hosting module 1906 can include oneor more instances of cores 1910, 1920, 1930, emulators 1912, 1922, 1932,module(s) 1955, variants 1961, 1962, event handlers 1963, 1964, objects1971, 1972, or threads 1975, 1976. Module(s) 1955 can each optionallyform a part of application(s) 1950 or can include one or moreinstruction sequences 1951, 1952 or apparent flaw(s) 1954. In generaleach object 1972 can have one or more instances 1973, 1974. One or moreinstances of system 1900 can be implemented, for example, in system 100or network 190 of FIG. 1, in module 1702 or hub 1720 of FIG. 17, insystem 1800 of FIG. 18, or as a stand-alone system.

With reference now to FIG. 20, shown is an example of a system that mayserve as a context for introducing one or more processes and/or devicesdescribed herein. As shown system 2000 can (optionally) include one ormore instances of control modules 2004, monitoring modules 2005, orhosting modules 2006. Monitoring module 2005 can include one or moreinstances of comparators 2010, error records 2020, parameters 2028 andother information 2029, expected results 2032, emulation data 2034,parameters 2036, retrieval logic 2038, inputs 2051, 2052 at userinterface 2050 or the like, ports 2056, or filters 2057. Comparator 2010can include one or more instance of theoretical results 2014, actualresults 2016, or the like. Error record 2020 can include one or moreinstances of names 2022, locations 2024, or other parameters 2026 suchas are described herein relating an error type or behavior to an eventor service. Hosting module 2006 can include one or more instances ofcore(s) 2040, emulator(s) 2075, or flaw indication(s) 2080 such as errortypes 2081, warning types 2082, or the like. Core 2040 can likewiseinclude (at various times as described herein) one or more instances ofmetadata 2046, module output 2047, register values 2048, or thread(s)2070. Each such thread can (optionally) include one or more instances oftiming error indication 2061, code sequence 2062 (containing apparentflaw 2063 related to error type 2081 or other flaw indication 2080 insome instances), random noise indications 2064, instruction sequence2065, apparent flaw 2067 (causing warning type 2082 or other flawindication 2080 in some instances), or the like. Some configurations ofsystem 2000 can be implemented, for example, in system 100 or network190 of FIG. 1, in module 1702 or hub 1720 of FIG. 17, in system 1900 ofFIG. 19, or as a stand-alone system.

With reference now to FIG. 21, shown is an example of a system that mayserve as a context for introducing one or more processes and/or devicesdescribed herein. As shown system 2100 can include one or more instancesof hosting modules 2110, feedback modules 2170, user interfaces 2180, oraccess modules 2190. Hosting module 2110 can include one or moreinstances of emulators 2111 or core(s) 2115, the latter optionallyincluding operating systems 2120 or services 2140. Operating system 2120can (optionally) include one or more of sockets 2121 or drivers 2122.Service 2140 can likewise include one or more sequences 2141, 2155 orservice instances 2156, 2157, 2158. Sequence 2141 can include one ormore of instances 2142, 2143, which can optionally obtain instanceoutput 2144 or the like as described below. Feedback module 2170 caninclude evaluation circuitry 2171, which can optionally generate orotherwise handle expression 2174 as described below. User interface 2180can handle one or more of inputs 2184, 2185 or output 2187. Accessmodule 2190 can (optionally) include one or more of allocation(s) 2191at port 2192, sequence(s) 2193 at port 2194, or authorization 2197 atport 2196. Some configurations of system 2100 can be implemented, forexample, in primary system 330 or remote system 360 of FIG. 3, in module1704 or hub 1720 of FIG. 17 (optionally linked directly, through passivemedia, with module 1702 as described herein), or as a stand-alonesystem.

With reference now to FIG. 22, shown is an example of a system that mayserve as a context for introducing one or more processes and/or devicesdescribed herein. As shown system 2200 can include one or more instancesof signaling circuitry 2210 or access controllers 2270. Signalingcircuitry 2210 can (optionally) handle or otherwise include one or moreinstances of tables 2225 or other policy implementation circuitry 2224,search terms 2227 or other pattern recognition circuitry 2228, joiningexpressions 2233 or other type definition logic 2230, processor(s) 2242,2243, query logic 2244, replies 2245, cost evaluation logic 2247,decisions 2248, default responses 2256, modeling logic 2257, port(s)2258, 2268, environments 2262, 2263, 2265, network managers 2266, systemmonitors 2267, or the like. Table 2225 can include one or more record(s)2201 each associating one or more policy indications 2202 with one ormore identifiers 2203 of variables, sequences, resources, or otherobjects.

Access controller 2270 can likewise include, at various times in someinstances, one or more of resource(s) 2275, version recognitioncircuitry 2276, resource authorization(s) 2277, port(s) 2278, codegenerator(s) 2280 (optionally with reference(s) 2281 or indication(s)2282), code generator(s) 2280 (optionally with reference(s) 2281 orindication(s) 2282), code generator(s) 2285 (optionally withreference(s) 2286 or indication(s) 2287), policy definition(s) 2291 orother implementation logic 2290, user interface 2295, or the like. Asexemplified below, user interface 2295 can include one or more ofexplanation 2298 or response 2299. Some configurations of system 2200can be implemented, for example, in primary system 500 or externalsystem 550 of FIG. 5, in module 1706 or hub 1720 of FIG. 17, or as astand-alone system.

With reference now to FIG. 23, shown is an example of a system that mayserve as a context for introducing one or more processes and/or devicesdescribed herein. As shown transmission or other media 2300 can bear orotherwise include one or more instances of “A” type software 2301, “B”type software 2302, provider identifier(s) 2361, or versionidentifier(s) 2372. Object 2381 of “A” type software 2301 can includeone or more instances of potential vulnerability 2341, provideridentifier(s) 2361, version identifier 2372, or the like. Object 2382 of“A” type software 2301 can likewise (optionally) include one or moreinstances of potential defect(s) 2352, provider identifier(s) 2362,version identifier 2372 or the like. Optionally, objects 2381, 2382 canlikewise both (or all) include a common edition or other versionidentifiers such as identifier 2372.

“B” type software 2302 can optionally include object(s) 2305, 2306 ofapplication 2307 as well as “C” type software 2303 or “D” type software2304. For example, object 2383 of “C” type software 2303 can include oneor more instances of potential vulnerabilities 2343, potential defects2353, provider identifiers 2363, or the like. Object 2384 of “D” typesoftware 2304 can likewise include one or more instances of potentialvulnerabilities 2344, potential defects 2354, version identifiers 2374,or the like. Some configurations of media 2300 can be implemented, forexample, as an element of primary system 500 or external system 550 ofFIG. 5, in module 1706 or hub 1720 of FIG. 17, in system 2200 of FIG.22, or as a storage disc or other article of manufacture.

With reference now to FIG. 24, shown is an example of a system that mayserve as a context for introducing one or more processes and/or devicesdescribed herein. As shown system 2400 can include one or more instancesof signaling circuitry 2410, processing circuitry 2450, resources 2491,2492, or sequence comparators 2496. Signaling circuitry 2410 can(optionally) include one or more instances of routing controllers 2420(optionally operable for handling configurations 2421, 2422) or accesscontrollers 2430 (optionally operable for handling resourceauthorizations 2436, 2437).

Processing circuitry 2450 can (optionally) include one or more instancesof emulators 2460, 2470, 2480 or environments 2462, 2472, 2482.Environment 2462 can include one or more instances of software objects2465, 2466 in address spaces 2464, 2467 as shown. (In some embodiments,an “address space” can refer to an allocated portion of a memory orother storage medium, for example.) Environment 2472 can likewiseinclude one or more instances of objects 2475, 2476 in address spaces2474, 2477 as shown. Further, environment 2482 can likewise include oneor more instances of address spaces 2484, 2487, one or more of which cancontain code sequences or like objects 2485, 2486 such as are describedbelow, and especially those which are referred to with reference toFIGS. 36-38. Some variants of system 2400 can be implemented, forexample, in primary system 500 or external system 550 of FIG. 5, inmodule 1706 or hub 1720 of FIG. 17, in system 2200 of FIG. 22, or as astand-alone system.

With reference now to FIG. 25, shown is an example of a system that mayserve as a context for introducing one or more processes and/or devicesdescribed herein. As shown system 2500 can include one or more instancesof system managers 2501, emulation managers 2502, policy selection logic2503, security modules 2509, invocation logic 2515 or other signalinglogic 2518, software 2540, servers 2546, firewalls 2548, configurationcircuitry 2549, emulators 2550, 2560, 2570, 2580, aggregation modules2590, or data 2595. Security module 2509 can likewise include, define,or implement one or more instances of practices 2505, 2506, 2507, 2508or other policy logic 2504. Software 2540 can include one or moreinstances of instruction sequences 2541, 2542, 2543. Aggregation module2590 can (optionally) include one or more instances of sensors 2591,2592 or testing logic 2594. Data 2595 can include one or more instancesof values 2596 or record(s) 2597, 2598 as described herein. Emulator2550 can include one or more instances of policy logic 2552 orenvironments 2557. Emulator 2560 can include one or more instances ofpolicy logic 2562 or environments 2567. Emulator 2570 can include one ormore instances of policy logic 2572 or environments 2577. Emulator 2580can include one or more instances of policy logic 2582 or environments2587. Some implementations of system 2500 can be implemented, forexample, in primary system 710 or external system 740 of FIG. 7, inmodule 1708 or hub 1720 of FIG. 17, or as a stand-alone system.

With reference now to FIG. 26, shown is an example of a system that mayserve as a context for introducing one or more processes and/or devicesdescribed herein. As shown signaling module 2600 can (optionally)include one or more instances of data 2620, software 2630, arbiters2644, request logic 2645, routing logic 2646, exception handlers 2647,security logic 2648, firewalls 2649, environments 2671, 2681, orprocessors 2672, 2682. Data 2620 can likewise include one or moreinstances of risk evaluations 2621 or identifiers 2622 in messages 2623,errors 2625, leakage rates 2627, thresholds 2629, or the like. Software2630 can (optionally) include instances of sequences 2631, 2632 orobjects 2633, 2634, 2635, 2637, 2638, 2639 or the like. One or moreinstances of signaling module 2600 can be implemented, for example, inprimary system 910 of FIG. 9, in module 1710 or hub 1720 of FIG. 17, insystem 2200 of FIG. 22, in system 2500 of FIG. 25, or as a stand-alonesystem.

With reference now to FIG. 27, shown is an example of a system that mayserve as a context for introducing one or more processes and/or devicesdescribed herein. As shown system 2700 can include one or more instancesof software 2706, media 2712 or other storage modules 2711, invocationmodules 2715, security restrictions 2716, allocation logic 2718,aggregation logic 2719, data 2720, signaling module 2740, or machines2760, 2770, 2780. Each instance of software 2706 can (optionally)include one or more instruction sequences 2701, 2702, 2703, 2704. Data2720 can include one or more instances of segments 2722 (optionally withparameter value(s) 2721) in regions 2723, segments 2726, indications2727, stacks 2728, or the like. Signaling module 2740 can include one ormore instances of control module(s) 2742, stack managers 2743, mediamanagers 2744, indications 2746, emulators 2747, event monitors 2748,routers 2750 operable for acting on selections 2752, filters 2754,servers 2755, security logic 2756 or request logic 2758 operable forhandling requests 2759. Machine 2760 can include processor 2762 and oneor more instances of object 2765 or processes 2767 of environment 2764,results 2768, or emulators 2769. Machine 2770 can likewise includephysical or virtual processor 2772 and one or more instances of object2775 or processes 2777 of environment 2774, results 2778, or emulators2779. Further, machine 2780 can include processor 2782 and one or moreinstances of object 2785 or processes 2787 (active or otherwise) ofenvironment 2784 (or others), results 2788, or emulators 2789 asdescribed further below. Some configurations of system 2700 can beimplemented, for example, in primary system 1110 or external system 1140of FIG. 11, in module 1712 or hub 1720 of FIG. 17, or as a stand-alonesystem.

With reference now to FIG. 28, shown is an example of a system that mayserve as a context for introducing one or more processes and/or devicesdescribed herein. As shown system 2800 can include one or more instancesof data 2809, selection logic 2814 operable to handle one or moreselections 2813, evaluation modules 2815 operable to apply or otherwisehandle one or more performance-indicative requirements 2816, taskmanagers 2817, ports 2818, aggregation logic 2819, signaling modules2840 (optionally including mode logic 2847), and machines 2860, 2870,2880, 2890. Data 2809 can include one or more instances of segments2804, 2805, evaluations 2807, or other portions 2808 of data. Machine2860 can include one or more instances of (physical or virtual)processors 2862, environments 2864, or emulators 2869. Environment 2864can (optionally) include one or more instances of sequence(s) 2866 orsessions 2867 associated with user 2868. In machine 2870, processor 2872can optionally host one or more sequences 2876, 2877, 2878 inenvironment(s) 2874, such as by emulator 2879. In machine 2880,processor 2882 can optionally host one or more sequences 2886, 2887,2888 in environment(s) 2884, such as by emulator 2889. In machine 2890,processor 2892 can optionally host one or more of sequence(s) 2892 inenvironment 2891 or sequence(s) 2895 in environment 2894 so as togenerate data 2899 as described herein. Some configurations of system2800 can be implemented, for example, in primary system 1110 or externalsystem 1140 of FIG. 11, in module 1712 or hub 1720 of FIG. 17, in system2700 of FIG. 27, or as a stand-alone system.

With reference now to FIG. 29, shown is an example of a system that mayserve as a context for introducing one or more processes and/or devicesdescribed herein. As shown aggregation module 2900 can include one ormore instances of sequences 2901, parameters 2902, objects 2903, 2904,2905, 2906, filters 2907, modules 2908, or other software 2909. System2900 can likewise include one or more instances of results 2910, data2929, update logic 2932, ports 2934, 2935, analyzers 2940, sensors 2944,2945, 2946, 2947, inputs 2950 (such as one or more messages 2952, e.g.),statistical logic 2954, retrieval circuitry 2955, or environment 2967,2977, 2987, 2997. For example, result 2910 can include one or moreinstances of segments 2911, 2912, indications 2913, pattern 2915, otherdata 2916, indications 2917, conditions 2918, levels 2919, or the like.Data 2929 can include one or more instances of segments 2922, minima2923, maxima 2924, limits 2926, patterns 2927, changes 2928, or thelike. Analyzer 2940 can be operable to apply one or more instances offilters 2942 or benchmarks 2943. Some configurations of aggregationmodule 2900 can be implemented, for example, in primary system 1110 orexternal system 1140 of FIG. 11, as module 1712 of FIG. 17, in system2800 of FIG. 28, or as a stand-alone system.

With reference now to FIG. 30, shown is an example of a system that mayserve as a context for introducing one or more processes and/or devicesdescribed herein. As shown system 3000 can include one or more ofinstances of software 3006, timing logic 3007, error patterns 3008, oneor more checkpoints 3009, evaluation modules 3050, invocation logic3051, service routers 3052, detection logic 3054, host control circuitry3056, intrusion protection logic 3057, or task managers 3058. Software3006 can include one or more instances of instruction sequences 3001,3002, 3003, 3004, or other software objects 3005. In some embodiments,an “object” of software can include an executable sequence, source code,a data object, a function or other service, or the like, implementedprimarily in software. In some contexts, such a “service” can includeone or more of an application, a process, a resource, a function, aqueue, an operating mode, an emulation environment, or the like.

In some implementations, system 3000 can likewise contain machine 3060with processor 3062, machine 3070 with processor 3072, machine 3080 withprocessor 3082, or machine 3090 with processor 3092. Where included,machines 3060, 3070, 3080, 3090 can optionally implement virtualmachines in various configurations. In some embodiments, a “machine” forpartial or full emulation can include an operating system or othersoftware using generally common resources that are actually available toother software but which usually appear within an emulation environmentof the machine to be dedicated resources. These resources can includeone or more of an instruction set, a set of registers, a stack, a heap,a peripheral device, a communication bus, a processor, or the like.Processors 3062, 3072, 3082, 3092 can each optionally be physical,emulated, or hybrid, as will be understood by those skilled in the art.

Machine 3060 can include one or more of environment 3064 (with access toone or more of instruction sequence 3066 or process 3067, e.g.) oremulator 3069 as described below. Machine 3070 can likewise include oneor more of environment 3074 (with access to one or more of instructionsequence 3076 or process 3077, e.g.) or emulator 3079. Machine 3080 canlikewise include one or more of environment 3084 (with access to one ormore of instruction sequence 3086 or sequence 3087, e.g.) or emulator3089. Machine 3090 can likewise include one or more of environment 3094(with access to one or more of instruction sequence 3096 or process3097, e.g.) or emulator 3099. Those skilled in the art will recognize avariety of particular configurations and operational relations that canexist among these various components in various instances of system 3000in light of the following operational descriptions. It will beunderstood, for example, that one or more of processors 3062, 3072,3082, 3092 can optionally be implemented in software, for example. Someconfigurations of system 3000 can be implemented, for example, inprimary system 1310 or external system 1340 of FIG. 13, in module 1714or hub 1720 of FIG. 17, or as a stand-alone system.

With reference now to FIG. 31, shown is an example of a system that mayserve as a context for introducing one or more processes and/or devicesdescribed herein. As shown system 3100 includes one or more instances ofevaluation modules 3150 with one or more instances of processors 3172.Evaluation module 3150 can further include one or more instances ofsoftware 3107, interfaces 3120, environment 3174, emulators 3178, 3179,processors 3182, environments 3184, emulators 3188, cores 3189,compilers 3192 (optionally handling error data 3193), other error data3194 optionally generated by testing logic 3195, rule checkers 3196,security logic 3197, policy implementation circuitry 3198, or the like.Software 3107 can include one or more of (instruction) sequence 3101,sequence 3102, sequence 3103, sequence 3104, one or more softwareobjects 3105, or one or more software objects 3106. Interface 3120 caninclude one or more of port 3121, input 3124, or watermark data 3129.Environment 3174 can include one or more of instruction sequence 3176 orprocess(es) 3177. Environment 3184 can include one or more ofinstruction sequence 3186 or process(es) 3187. Those skilled in the artwill recognize a variety of particular configurations and operationalrelations that can exist among these various components in variousinstances of evaluation modules 3150 in light of operationaldescriptions herein. Some configurations of system 3100 can beimplemented, for example, in primary system 1310 or external system 1340of FIG. 13, in module 1714 or hub 1720 of FIG. 17, in system 3000 ofFIG. 30, or as a stand-alone system.

With reference now to FIG. 32, shown is an example of a system that mayserve as a context for introducing one or more processes and/or devicesdescribed herein. As shown system 3200 can include one or more ofsoftware 3207, interface 3220, decision module 3230, signaling module3250, machine 3260 with processor 3262, machine 3270 with processor3272, or machine 3280 with processor 3282. Software 3207 can(optionally) include one or more of instruction sequence 3201,instruction sequence 3202, source code 3204, or machine code 3205.Interface 3220 can include one or more of network linkage 3221, port3222, input 3224, message(s) 3228, or evaluation 3229. Decision module3230 can include one or more of decision 3235 or monitoring module 3290.Monitoring module 3290 can include one or more of aggregator 3291(optionally having event data 3292) or risk evaluation logic 3299.Signaling module can include one or more of intake circuitry 3251,memory manager 3254, or operational history 3255. Machine 3260 caninclude one or more of environment 3264, output 3268, or emulator 3269as described below. Environment 3264 can access or otherwise “contain”one or more of object(s) 3265, virtual memory 3266, or processor 3267.Environment 3264 can be physical, in some embodiments, emulated (e.g. byemulator 3269 or the like), or some hybrid of the two. Environment 3274can likewise contain one or more of object(s) 3275, virtual memory 3276,or processor 3277. Environment 3284 can likewise contain one or more ofobject(s) 3285, virtual memory 3286, or processor 3287. Those skilled inthe art will recognize a variety of particular configurations andoperational relations that can exist among these various components invarious instances of systems 3200 in light of the following operationaldescriptions. It will be understood, for example, that one or more ofprocessors 3262, 3272, 3282 can optionally be implemented in software,for example. Some configurations of system 3200 can be implemented, forexample, in primary system 1510 or external system 1540 of FIG. 15, inmodule 1716 or hub 1720 of FIG. 17, or as a stand-alone system.

With reference now to FIG. 33, there are shown several variants of theflow 200 of FIG. 2. Operation 220—obtaining a software flaw indicationresulting from an emulation of a first instance of a thread at leastpartly in response to a first input from a user interface—may includeone or more of the following operations: 3321, 3323, 3327, or 3329. Thethread can, for example, arise by an execution of sequence 1725 or thelike, in embodiments in which hub 1720 implements one or more instancesof systems 1800, 1900, 2000 as described herein for acting on othersequences, which sequence 1725 can include. Operation 280—manipulating asecond instance of the thread at least partly in response to a secondinput arriving from the user interface after beginning the emulation ofthe first instance of the thread—may include one or more of thefollowing operations: 3382, 3384, or 3388.

Operation 3321 describes receiving one or more of an error signal or awarning in the software flaw indication (e.g. port 2056 receiving flawindication 2080 containing at least one of error type 2081 or warningtype 2082). This can occur, for example, in embodiments in which one ormore instances of monitoring modules 1803, 2005 perform operation 220and in which one or more instances of control modules 1804, 1904, 2004or hosting modules 1906, 2006 perform operation 280. Error type 2081 canindicate a divide-by-zero, an illegal write or read, a timeout, or anyother (actual or apparent) occurrence of an error. Warning type 2082 canindicate one or more of a failure prediction, a resource shortagerecord, a risk, a slower-than-nominal rate, or the like.

Operation 3323 describes creating the first instance of the thread inresponse to the first input from the user interface (e.g. emulator 1932creating thread 1975 by executing instruction sequence 1952 according toselected parameters 1894 received from user interface 1899). This canoccur, for example, in a variant of system 1800 that implements hostingmodule 1906 or other parts of system 1900, in which hosting module 1906and monitoring module 1803 jointly perform operation 220, and in whichat least control module 1904 performs operation 280. In some variants,such selections can specify one or more checkpoints 1896, environmentalparameters 1893, module parameters 1894, timing 1892, expectedintermediate or final results 1895, or the like.

Operation 3327 describes generating the software flaw indication as anincorrect computational result of the emulation of the first instance ofthe thread (e.g. at least emulator 2075 generating one or more ofmetadata 2046, module output 2047, register values 2048, or the likethat differ from one or more corresponding expected results 2032).Alternatively or additionally, some variants can include a comparator2010 that can detect that the result is incorrect, such as by comparingactual results 2016 (generated with known parameters 2036, e.g.) thatcan then be compared with corresponding theoretical results 2014.

Operation 3329 describes configuring an emulation environment inresponse to the first input from the user interface (e.g. configurationlogic 1850 causing core 1910 to access server 1908, to implement faultdetection logic 1837 or error recovery logic 1832, to adjust eventsimulation or other timing 1892, or the like according to informationindicated in input 1890). This can occur, for example, in embodiments inwhich one or more instances of monitoring modules 1803, 2005 performoperation 220 and in which one or more instances of control modules1804, 1904, 2004 or hosting modules 1806, 1906 perform operation 280.Alternatively or additionally, emulator 1912 can generate or adaptserver 1908 virtually (as a database server, web server, or the like) inresponse to a suitable input 1981 from user interface 1980.

Operation 3382 describes executing at least a portion of the secondinstance of the thread natively (e.g. core 2040 executing at leastinstruction sequence 2065 of instance 2068 natively). This can occur,for example, in an embodiment in which another portion has an apparentflaw (e.g. sequence 2062 having apparent flaw 2063), in which emulator2075 emulates the “first” instance 2069 of thread 2070 in response to“first” input 2051, and in which “second” instance 2068 is manipulatedpartly in response to “second” input 2052, in which control module 2004and hosting module 2006 jointly perform operation 280, and in which atleast monitoring module 2005 performs operation 220. In some variants,for example, monitoring module 2005 indicates one or more timing errorindications 2061, random noise indications 2064, or some other apparentflaw 2067 as parameters 2026 of error record 2020.

Operation 3384 describes presenting a common image graphicallydistinguishing the first instance of the thread from the second instanceof the thread (e.g. display 1987 showing common image 1988 containingicons 1989, windows, or the like respectively representing each ofinstances 1973, 1974). This can occur, for example, in embodiments inwhich system 1900 includes at least one of the monitoring modules 1803,2005 configured to perform operation 220, and in which control module1904 performs operation 280.

Operation 3388 describes receiving the second input from the userinterface after obtaining the software flaw indication resulting fromthe emulation of the first instance of the thread (e.g. port 1996 orport 1997 receiving input 1982 from user interface 1980 after port 1997or module 1955 receives or generates a warning or error message).Alternatively or additionally, in some embodiments, emulator 1932 orcompiler 1995 can generate the software flaw indication in various modesas described herein, such as by emulating or otherwise processingsequence 1952.

With reference now to FIG. 34, there are shown several variants of theflow 200 of FIG. 2 or 33. Operation 220—obtaining a software flawindication resulting from an emulation of a first instance of a threadat least partly in response to a first input from a user interface—mayinclude one or more of the following operations: 3421, 3424, 3425, or3428. Operation 280—manipulating a second instance of the thread atleast partly in response to a second input arriving from the userinterface after beginning the emulation of the first instance of thethread—may include one or more of the following operations: 3483, 3486,or 3487.

Operation 3421 describes obtaining the software flaw indication at anon-volatile storage element (e.g. aggregation manager 1831 receiving atleast flaw indication 1840 resulting from the emulation, such as forarchiving on data storage disks 1882 or the like). This can occur, forexample, in embodiments in which one or more instances of monitoringmodules 1803, 2005 perform operation 220 individually or jointly, andoptionally in combination with other structures as described herein.

Operation 3424 describes extracting the software flaw indication from aresource containing data resulting from emulating another thread (e.g.retrieval logic 2038 finding flaw indication 2080 and related parameters2028 and other information 2029 about an outcome of emulating thread2070). This can occur, for example, in embodiments in which the instance2068 of thread 2070 executes in an environment in common with instance2069 or object 1972 operating in a common environment with a variant1962 of object 1972, or otherwise in which the “other” object is relatedto “the” object in some fashion. Alternatively or additionally, some orall of the extraction can be obtained by passing raw emulation data 2034through data selection filter 2057.

Operation 3425 describes deciding to obtain a component of the softwareflaw indication in response to another component of the software flawindication (e.g. event handler 1884 responding to flaw indicationcomponent 1846 by creating or otherwise obtaining component 1847). Forexample, event handler 1884 can respond to computation error indications1849 by requesting one or more of call stack 1852, interaction history1853, registry 1854, workspace contents 1855, or other state information1859. Such a response can be helpful, for example, in a context in whichdifferent types of components are most useful for different types offlaw indications.

Operation 3428 describes causing the software flaw indication toidentify a software module containing the thread (e.g. event handler1963 generating an error record 2020 containing a name 2022 or location2024 of application 1950 or module 1955 containing sequence 1951 beingemulated when an apparent flaw 1954 appears). In some circumstances, anearlier-executed instruction sequence 1951 can be associated with theapparent flaw 1954 for example, through human or automatic analysis.

Operation 3483 describes receiving the second input after manifestingthe software flaw indication at the user interface (e.g. input device1985 receiving input 1982 after driver 1991 transmits a graphical,auditory, or other representation 1992 of flaw indication 1840 to outputdevice 1986 or otherwise into a vicinity of input device 1985). Forexample, such manifestations can prompt a user to push back or otherwisediminish whichever instances are less problematic, or to initiate anevaluation or correction in response to the indication, or to terminatean unneeded instance, or otherwise to act on the second instance of thethread.

Operation 3486 describes receiving the second input from the userinterface after concluding the emulation of the first instance of thethread (e.g. port 1996 receiving user action indications from userinterface 1980 or other data 1998 after emulator 1922 aborts thread 1976or otherwise finishes executing instance 1973). This can occur, forexample, in embodiments in which hub 1720 includes one or more instancesof monitoring modules 1803, 2005 configured to perform operation 220 andin which module 1702 includes one or more instances of control module1904 (optionally with hosting module 1906) configured to performoperation 280.

Operation 3487 describes manipulating a variant of the thread at leastpartly in response to the second input from the user interface (e.g.code generator 1907 or editor 1994 adapting at least sequence 1951 ofmodule 1955 in response to user commands or other input 1981). This canoccur in an embodiment in which module 1702 includes an instance ofsystem 1900 providing the first and second inputs, for example, frominput device 1985. Alternatively or additionally, hub 1720 can includean instance of hosting module 1906 or other systems herein operable tohost the emulation from which the software flaw indication results. Suchcooperative or distributed systems can facilitate task specialization,load balancing, or other processing efficiencies in light of teachingsherein.

With reference now to FIG. 35, there are shown several variants of theflow 400 of FIG. 4. Operation 430—indicating a virtually instantiatedservice via a data flow between a user interface and an operatingsystem, the virtually instantiated service including at least a virtualinstance—may include one or more of the following operations: 3532,3534, 3536, or 3538. Operation 440—accessing another instance of thevirtually instantiated service at least partly in response to the userinterface after indicating the virtually instantiated service via thedata flow between the user interface and the operating system—mayinclude one or more of the following operations: 3543, 3545, 3547, or3549.

Operation 3532 describes indicating a progress level relating to thevirtually instantiated service to the user interface (e.g. evaluationcircuitry 2171 indicating a quantity or other expression 2174 of anamount of a task done or yet to do). This can occur, for example, inembodiments in which feedback module 2170 performs operation 430 and inwhich access module 2190 performs operation 440.

Operation 3534 describes transmitting a command relating to thevirtually instantiated service to the operating system (e.g. userinterface 2180 indicating a delete, undelete, pause, resume, fetch,terminate, create, undo, reconfigure, or other command relating to aninstance 2142 or other aspect of service 2140 to operating system 2120).

Operation 3536 describes executing a native portion of a module thatincludes the virtually instantiated service (e.g. one or more cores 2115natively executing at least instruction sequence 2155 while emulator2111 executes at least instance 2143 of sequence 2141). This can occur,for example, in embodiments in which service 2140 comprises a codemodule comprising two or more instruction sequences 2141, 2155.Alternatively or additionally, the native portion can be executedbefore, after, or interleaved with an emulation of the service.

Operation 3538 describes initiating the data flow between the userinterface and the operating system in response to the virtual instance(e.g. socket 2121 transmitting output 2144 or some other indication ofservice 2140 to user interface 2180 responsive to detecting or beingnotified that instance 2157 has been created or has generated output2144).

Operation 3543 describes terminating the other instance of the virtuallyinstantiated service in response to the user interface after indicatingthe virtually instantiated service via the data flow between the userinterface and the operating system (e.g. driver 2122 deleting orotherwise stopping instance 2158 of service 2140 in response to input2185 after feedback module 2170 performs operation 430).

Operation 3545 describes obtaining an undo command relating to thevirtually instantiated service (e.g. port 2194 receiving undo command asinput 2185 from user interface 2180 or in error response sequence 2193,either of which can relate to an instance or other aspect of service2140). Input 2185 can indicate a command to undo a “start task” or“delete object” command, for example. Alternatively or additionally,error response sequence 2193 can contain or refer to such an undooperation in response to an error message. In some variants, an “undone”task can be queued to be performed later, for example, under safercircumstances.

Operation 3547 describes receiving an authorization relating to theother instance of the virtually instantiated service (e.g. port 2196receiving input 2184 comprising some form of authorization 2197 viainterface 2180 or instance 2158 of service 2140). In some variants, suchauthorization can be a requirement for accessing the “other” instance(as instance 2156, for example) or for accessing some other object(s)within core(s) 2115.

Operation 3549 describes receiving a scalar value of at least apotential allocation relating to the other instance of the virtuallyinstantiated service (e.g. port 2192 receiving an actual or forecastallocation 2191 in terms of cost, time, or other resources in relationto instance 2156). This can occur, for example, in embodiments in whichaccess module 2190 performs operation 440, in which “the” virtualinstance includes at least a portion of instance 2158, and in whichfeedback module 2170 performs operation 430 (optionally in concert withor in addition to user interface 2180 or hosting module 2110). Withreference now to FIG. 36, there are shown several variants of the flow600 of FIG. 6. Operation 680—obtaining a resource authorizationdependent upon apparent compliance with a policy of causing an emulationenvironment to isolate a first software object type from a secondsoftware object type—may include one or more of the followingoperations: 3682, 3684, 3685, or 3689. Operation 690—signaling adecision whether to comply with the policy of causing the emulationenvironment to isolate the first software object type from the secondsoftware object type—may include one or more of the followingoperations: 3691, 3594, or 3696.

Operation 3682 describes configuring the resource authorization at leastin response to an indication of a potential defect in an object of thesecond software object type (e.g. code generator 2280 creating oradapting resource authorization 2277 in response to object 2383 of “C”type software 2303 apparently having a resource allocation bug or otherpotential defect 2353). In an environment in which all “Brand X”software is considered prone to include memory leaks, resourceauthorization 2277 (for a network printer, e.g.) can be configured todepend upon such software being quarantined into a virtual machine orlike environment. The “types” into which software is organized canlikewise depend on a programmer, a revision number, a distribution mode,a command sequence, a data or file type, or the like.

In some variants, code generator 2280 can receive an indication 2282 ofan actualized or other potential defect—a bug report, error log,speculative execution outcome, reputation data, or the like—inassociation with reference 2281 to the object(s) or type(s). Codegenerator 2280 can (optionally) respond by implementing a policy ofisolating the object(s) or type(s), preferably according to the apparentnature of the potential defect: its severity, a target software type orother vulnerability to which it relates, whether it is apparentlymalicious, how burdensome emulation may be, or the like.

Operation 3684 describes executing an instance of the second softwareobject type natively (e.g. processor 2242 executing one or more ofobjects 2381, 2382, 2383 directly and physically in environment 2262,without emulation). This can occur, for example, in embodiments in whichthe emulation environment comprises environment 2263 hosting object2384, in which “D” type software 2304 is the “first” type, and in whichthe “second” type comprises one or more of “A” type software 2301 or “C”type software 2303.

Operation 3685 describes configuring the resource authorization at leastin response to an indication of a potential vulnerability in an objectof the first software object type (e.g. code generator 2285 creating oradapting resource authorization 2277 in response to object 2384 of “D”type software 2304 apparently having valuable data or other potentialvulnerability 2344). In some variants, code generator 2285 receives anindication 2287 of such a potential vulnerability—a contact list orother trade secret, a susceptibility to denial-of-service attacks, acritical function or the like—in association with reference 2286 to theobject(s) or type(s). In some variants, all messages from a specificindividual, all source code, or all files in a specific location aredeemed critical, potential targets of attack. In response, codegenerator 2285 can (optionally) implementing a policy of isolating theobject(s) or type(s), preferably in a selective manner according to theapparent nature of the potential vulnerability.

Operation 3689 describes receiving the resource authorization from anexternal source (e.g. port 2278 receiving resource authorization 2277from external system 550). This can occur, for example, in embodimentsin which primary system 510 implements or otherwise can access one ormore of signaling circuitry 2210, access controller 2270, or media 2300.In some variants, resource authorization 2277 can further comprise anoncontingent authorization to access resource 2275, for example, or acontingent authorization to access resources comprising external system550.

Operation 3691 describes transmitting a negative response as thedecision whether to comply with the policy of causing the emulationenvironment to isolate the first software object type from the secondsoftware object type (e.g. port 2268 transmitting decision 2248indicating a past or potential noncompliance with the isolation policyin some fashion). Decision 2248 can be included in one or more messages,event reports, or other digital signals, for example.

Operation 3694 describes evaluating whether the first software objecttype is apparently isolated from the second software object type (e.g.system monitor 2267 determining whether environment 2265 or system 2200contain any instances of “B” type software 2302 able to access anyinstances of “A” type software 2301). In some variants, system monitor2267 can distinguish among various incidents or modes of access: howrecent; whether interference is apparently possible; whether an actualinteraction was proper; whether accessibility is mutual; which componenttypes, sequences, environments, or systems are/were involved; whichobject instances were involved; what process outcomes resulted; relatedresources and authorizations; or the like. Alternatively oradditionally, network manager 2266 can optionally aggregate or otherwiserespond to data of this type from other (external) systems in a virtualprivate network.

Operation 3696 describes causing the second software object type toinclude at least a third software object type and a fourth softwareobject type (e.g. type definition logic 2230 defining “B” type software2302 to include all objects of “C” type software 2303 or “D” typesoftware 2304). This can be implemented using a “OR” function or othersyntactic joining expression 2233, for example. As shown, of course, “B”type software 2302 can likewise be defined to include one or moreobjects of neither “C” type nor “D” type.

With reference now to FIG. 37, there are shown several variants of theflow 600 of FIG. 6 or 36. Operation 680—obtaining a resourceauthorization dependent upon apparent compliance with a policy ofcausing an emulation environment to isolate a first software object typefrom a second software object type—may include one or more of thefollowing operations: 3783, 3786, or 3789. Operation 690—signaling adecision whether to comply with the policy of causing the emulationenvironment to isolate the first software object type from the secondsoftware object type—may include one or more of the followingoperations: 3792, 3795, or 3797.

Operation 3783 describes implementing the policy in logic for causing anapplication to be hosted in a composite environment containing theemulation environment hosting at least one instance of the firstsoftware object type (e.g. implementation logic 2290 implementing theisolation policy as policy definition 2291, causing application 2307 tobe hosted in a composite environment). In a variant in which environment2265 is a composite environment, for example, component environment 2262can optionally host application object 2305 natively while componentenvironment 2263 hosts application object 2306 by emulation.

Operation 3786 describes expressing a human-readable explanation of thepolicy of causing the emulation environment to isolate the firstsoftware object type from the second software object type (e.g. userinterface 2295 displaying or playing explanation 2298 that resourceauthorization 2277 is contingent upon isolating “A” type software 2301).In some circumstances, user interface 2295 subsequently transmits aresponse 2299, either as received from a user or as a default, whichresource authorization 2277 can then take as the apparent compliance oras a refusal to comply.

Operation 3789 describes recognizing a version of the first softwareobject type or the second software object type (e.g. version recognitioncircuitry 2276 distinguishing among versions of “A” type software 2301or “D” type software 2304 by version identifiers 2372, 2374).Alternatively or additionally, a version of “C” type software 2303 canbe recognized in some variants by one or more of provider identifier2363, date or other header information, behavior, configuration, or thelike.

Operation 3792 describes evaluating an option of complying with thepolicy of causing the emulation environment to isolate the firstsoftware object type from the second software object type (e.g. costevaluation logic 2247 estimating a monetary, temporal, or otherpotential resource dispensation, opportunity cost, or the like inassociation with complying with the policy). Such an evaluation can beobtained as an actual hourly or other flat fee for a peripheral or otherresource access, a substitute cost or other comparable resource cost, anumber of computations or minutes, an amount of space, a fractional lossin server or other hardware performance, a risk evaluation, or the like.Modeling logic 2257 for generating such valuations can provide one ormore suitable determinants/components, which can then be compared orotherwise arithmetically or logically distilled by cost evaluation logic2247. The distillation can help to explain one or more options tofacilitate a user deciding, for example, or can be manifested as anautomatic generation of a default response 2256 or of the decision 2248of operation 690.

Operation 3795 describes seeking a pattern in an instance of the firstsoftware object type (e.g. pattern recognition circuitry 2228 seekingone or more instances of provider identifiers 2361, 2362, versionidentifiers 2372, 2374, or other search terms 2227 to identify orcharacterize a sequence of instructions as being of the “first” type).Such seeking can help locate the pattern(s), for example, in contexts inwhich one or more can occur in several locations within an application.This can provide a mode of identifying the “first” type, for example, asa complement to one or more of operations 3783, 3682, 3684, or 3685.

Operation 3797 describes receiving the decision whether to comply withthe policy of causing the emulation environment to isolate the firstsoftware object type from the second software object type (e.g. port2258 receiving a reply 2245 from a client or other external sourcemanifesting an indication of non-compliance). In some embodiments, forexample, such a reply may be received after query logic 2244 asks theclient to indicate the decision in some fashion: by accepting codeimplementing a conditional resource authorization (in a device driver ordriver update module, for example), by taking no action (in a“default=yes” or “default=no” context), by transmitting a device settingconfiguration indicating the policy compliance, or the like. This canoccur, for example, in embodiments in which one or more of accesscontroller 2270 or environment 2265 performs operation 680 and in whichsignaling circuitry 2210 performs operation 690.

With reference now to FIG. 38, there are shown several variants of theflow 600 of FIG. 6, 36, or 37. Operation 690—signaling a decisionwhether to comply with the policy of causing the emulation environmentto isolate the first software object type from the second softwareobject type—may include one or more of the following operations: 3892,3898, or 3899. Alternatively or additionally flow 600 may likewiseinclude one or more of operations 3853, 3856, or 3857—each depictedafter operation 690 but optionally performed concurrently with it, or inother orders.

Operation 3892 describes causing the emulation environment to contain atleast a portion of the first software object type and to exclude thesecond software object type (e.g. emulator 2460 causing environment 2462to contain at least object 2383 of “B” type and no “A” type software2301).

Operation 3898 describes hosting at least one instance of the firstsoftware object type in an address space not directly addressable fromthe emulation environment (e.g. emulator 2470 hosting object 2381 of “A”type in address space 2474, which cannot be addressed by any objectplaced into any portion of emulation environment 2482). This can occur,for example, in embodiments in which compliance with the policy issignaled by emulator 2480 using environment 2482 to isolate “A” typesoftware 2301 from some or all other software.

Operation 3899 describes hosting the second software object type in aportion of the emulation environment not directly addressable from atleast one instance of the first software object type (e.g. emulator 2480hosting one or more objects of “D” type software 2304 in address space2487, which cannot be addressed by object 2476 hosted by emulator 2470).This can occur, for example, in a context in which object 2381 (of “A”type software 2301) contains or is contained within an instance ofobject 2476 in address space 2474. This can optionally work as detailedabove with reference to operation 3898, for instance.

Operation 3853 describes isolating a resource in response to anindication of a native execution of an instance of the second softwareobject type (e.g. resource authorization 2437 denying some or all ofprocessing circuitry 2450 access to resource 2491 in response to anyindication that environment 2462 permitted any instruction sequence of“B” type software 2302 to execute natively). Each such isolation can bepermanent or temporary, complete or partial, and conditional orotherwise. For example, any instruction sequence of “C” type executingnatively in address space 2464 (object 2465, e.g.) can optionally causesome environments of processing circuitry 2450 (all except environment2462, e.g.) to be isolated from resource 2491 until resourceauthorization 2437 is reset. Alternatively or additionally, anyinstruction sequence of “D” type (e.g. object 2384) executing nativelyin address space 2467 can optionally force any objects in environment2462 to use resource 2492 instead, permanently.

Operation 3856 describes causing another emulation environment toisolate a first instance of the first software object type from a secondinstance of the first software object type (e.g. routing controller 2420implementing configuration 2421 so that emulation environment 2482 hostsan instance of object 2306 even while another instance of object 2306 orother “B” type software 2302 executes elsewhere in processing circuitry2450). This can occur, for example, in variants in which environment2482 is suitably isolated from one or more other virtual or physicalenvironments of processing circuitry 2450.

Operation 3857 describes determining whether an instruction sequence ofthe first software object type is identical to another instructionsequence (e.g. sequence comparator 2496 comparing “A” type object 2382with object 2466). In some embodiments, for example, such adetermination may dictate that the “other” instruction sequence is “A”type (if identical) or is of an “unknown” type (if not identical).

With reference now to FIG. 39, there are shown several variants of theflow 800 of FIG. 8. Operation 840—obtaining an indication of anemulation of a service in a first environment with a first securitycontrol practice—may include one or more of the following operations:3944, 3948, or 3949. Operation 880—signaling a decision whether to use asecond environment without the first security control practice inperforming at least a portion of the service as a result of theindication of the emulation of the service in the first environment withthe first security control practice—may include one or more of thefollowing operations: 3981, 3983, 3984, or 3989.

Operation 3944 describes emulating the service with an instructionsequence and with the first security control practice in response to aninsufficient trust level relating to the instruction sequence (e.g.testing logic 2594 causing emulator 2550 to host instruction sequence2543 in environment 2557 with policy logic 2552 in response to a riskevaluation above a maximum threshold). Testing logic 2594 can receive anindicator of the trust level (or its determinants) from outside system2500, for example. Alternatively or additionally, testing logic 2594 canestablish or refine a trust indicator in response to one or more earlierperformances of instruction sequence 2543. In some variants, the trustindicator may be vector valued, comprising more than one of a logicerror risk level, a malicious code trust level indicator, anauthenticity confidence level, or the like.

Operation 3948 describes causing the first environment to emulate afirst portion of the service and to execute a second portion of theservice natively (e.g. configuration circuitry 2549 loading instructionsequence 2541 into an emulation portion of environment 2557, loadinginstruction sequence 2543 into a physical portion of environment 2557,and causing environment 2557 to execute software 2540 accordingly). Sucha configuration may be advantageous for identifying defects in software2540, for example, by permitting breakpoints or other extra trackingduring the emulation of sequence 2541 without a loss of performancecorresponding to a full emulation of software 2540.

Operation 3949 describes implementing the first security controlpractice as one or more of a data integrity policy or a transactionintegrity policy (e.g. policy selection logic 2503 selecting a dataintegrity policy in policy logic 2552 for use in emulator 2550).Alternatively or additionally, policy selection logic 2503 can select adata integrity policy of practices 2506 for use in policy logic 2552. Insome variants, the implementation can be performed by copying areference to or code embodying software implementation of the practice,optionally with one or more other practices for use in emulator 2550.

Operation 3981 describes causing the second environment to use the firstsecurity control practice in response to the indication relating to thefirst security control practice (e.g. invocation logic 2515 triggeringemulator 2580 to use at least a selected one of practices 2507 as policylogic 2582 for hosting environment 2587). In some embodiments, theselected practice can arise in response to one or more of an error orother anomaly, a configuration or static attribute of the firstenvironment, an aspect of the first security control practice, or thelike. Alternatively or additionally, the practice can be selected as ahighest-ranked one of a list of practices (excluding “tried” practicessuch as the “first” security control practice).

Operation 3983 describes requesting the decision whether to use thesecond environment without the first security control practice (e.g.policy logic 2572 asking security module 2509 for instructions aboutwhether any new practices 2508 should be applied in environment 2577).Alternatively or additionally, security module 2509 or policy logic 2572can request an instruction sequence 2543 identifying or defining whichpractices should be applied.

Operation 3984 describes obtaining status information about the secondenvironment (e.g. emulator 2560 monitoring one or more services andtheir results in environment 2567). The status information can includeone or more of a loading level, a task list, a resource inventory, aregistry state, a recent event record, or other information that iscurrent when it is initially obtained. Alternatively or additionally,sensor 2592 can likewise obtain such information, in real time or atsome later time, optionally providing it to an aggregator as describedherein.

Operation 3989 describes deciding whether to perform any of the service(e.g. firewall 2548 deciding that system 2500 will not perform any ofinstruction sequence 2542, or will not perform it in emulator 2570, orwill only perform it with policy logic 2562, at least initially, inresponse to information indicating that sequence 2542 apparently has nohistory, certification, or other credentials). For example, theinformation (or apparent lack thereof) can be received through firewall2548 with sequence 2542. This can occur, for example, in embodiments inwhich aggregation module 2590 performs operation 840 and in whichsignaling logic 2518 and firewall 2548 jointly perform operation 880.

With reference now to FIG. 40, there are shown several variants of theflow 800 of FIG. 8 or 39. Operation 840—obtaining an indication of anemulation of a service in a first environment with a first securitycontrol practice—may include one or more of the following operations:4042, 4044, 4045, or 4046. The service can, for example, compriseexecuting sequence 1725 or the like, optionally including one or moreother sequences as described herein. Operation 880—signaling a decisionwhether to use a second environment without the first security controlpractice in performing at least a portion of the service as a result ofthe indication of the emulation of the service in the first environmentwith the first security control practice—may include one or more of thefollowing operations: 4081, 4087, or 4088.

Operation 4042 describes including at least state information from theemulation in the indication of the emulation of the service in the firstenvironment (e.g. emulation manager 2502 providing registry values 2596or a call stack indicative of a state of a process hosted in environment2577). Some or all of the process can be emulated, or can have beenemulated, for example, in environment 2577. Such state information canbe useful for characterizing an error (as repeatable or not, e.g.), forspawning variants of the emulation, for determining which softwareobjects in an environment are associated with an anomalous event, forperforming speculative executions, or the like.

Operation 4044 describes obtaining status information about the firstenvironment (e.g. system manager 2501 receiving a loading indication, aservice listing, a progress report, or the like from some or all ofenvironment 2577). Alternatively or additionally, a network monitor canmonitor or aggregate such information from one or more instances ofsystem 300 in a common network.

Operation 4045 describes obtaining current status information about theservice (e.g. server 2546 detecting that instruction sequence 2541currently has a low trust level or has recently been correlated with ahigher-than-nominal rate of anomalies in its physical environment, whichuses the first security control practice). The practice can include oneor more of a data redundancy scheme, an intrusion detection system,firewall 2548, or the like. In some variants, emulation manager 2502 canlikewise perform operation 4045 (e.g. by obtaining the information fromserver 2546) and then complete operation 840 (e.g. by causing emulator2570 to host sequence 2541 with an emulated practice like the firstsecurity control practice).

Operation 4046 describes receiving an indication that a transactionprotocol has been circumvented (e.g. sensor 2591 detecting a transactionor other interaction record 2597 for which there is not a correspondingauthorization or other support record 2598).

Alternatively or additionally, sensor 2591 can be configured to detectany of several types of violations of protocols such as may beimplemented in virtual private networks. See, e.g., U.S. Pat. Pub. No.2006/0010492 (“Method and Apparatus for Monitoring Computer NetworkSecurity Enforcement”) filed 10 Jun. 2002.

Operation 4081 describes deciding not to host the service in the secondenvironment without a second security control practice at least partlyin response to the indication signaling an incorrect outcome from theperformance of the service in the emulation environment with the firstsecurity control practice (e.g. policy logic 2504 causing one or morenew practices 2505 to be used in environment 2577 when emulating orotherwise executing sequence 2543 there, in response to a priorincorrect result from emulating sequence 2543 in environment 2587without practices 2505). The new practices 2505 may optionally includeconfirming a correct output from sequence 2543 in a special case, or atleast an absence of an error event, for example, before generating otheroutput. (In some embodiments, an “outcome” of a process, input set, orother operational object can include a termination time, an errormessage, a functional result, or the like resulting from one or moreinstances of the object. A single outcome can likewise “result from”each of two or more such objects jointly causing the outcome as well.)

Operation 4087 describes configuring the second environment without thefirst security control practice (e.g. emulator 2580 configuringenvironment 2587 without one or more practices 2505 used in the firstenvironment). Alternatively or additionally, signaling logic 2518 canlikewise signal the decision before (or without) actually configuringthe second environment.

Operation 4088 describes deciding to configure the second environmentwith a second security control practice in response to the indicationsignaling an anomaly from the performance of the service in theemulation environment with the first security control practice (e.g.emulator 2570 or some portion of security module 2509 deciding to usepolicy logic 2572 in configuring environment 2577 for sequence 2542, thedecision being in response to an anomalous completion of sequence 2542in environment 2567 with policy logic 2562). The anomalous completionmay be marked by an abnormally slow or fast task completion, by a memoryleakage event, by an error or incorrect result, or the like as describedherein.

With reference now to FIG. 41, there are shown several variants of theflow 1000 of FIG. 10. Operation 1010—obtaining one or more gradationalnorms of software performance in an emulation environment—may includeone or more of the following operations: 4112, 4116, or 4118. Operation1020—signaling a decision whether to allow a software object to executein another environment at least partly as a result of whether thesoftware object apparently performed in conformity with the one or moregradational norms of software performance in the emulationenvironment—may include one or more of the following operations: 4121,4124, 4125, 4127, or 4129.

Operation 4112 describes receiving at least one process concurrencethreshold of the one or more gradational norms (e.g. port 2934 receivingan artificial limit 2926 governing how many processes object 2905 maypermissibly use without becoming a substantial burden). In someembodiments, for example, object 2905 will not be routed to environment2977 (at operation 1020) if object 2905 ever employs more processes thanlimit 2926 in environment 2997.

Operation 4116 describes updating the one or more gradational norms ofsoftware performance (e.g. update logic 2932 providing incrementalchange(s) 2928 to one or more maxima 2924 to be applied by filter 2907,or a replacement module 2908 as an updated version of filter 2907). Thiscan occur, for example, in embodiments in which filter 2907 initiallycontains or refers to the gradational norm(s) of software performanceused in the emulation environment and in which aggregation module 2900performs operation 1010 as described herein.

Operation 4118 describes establishing a normal range comprising one ormore minima and one or more maxima of the one or more gradational norms(e.g. retrieval circuitry 2955 causing filter 2942 to implement adetermination of whether a time or frequency of a detectable event fallsbetween X−R/2 and X+R/2, where X is a nominal or expected value and R isa range defining an allowable deviation from X). For example, retrievalcircuitry 2955 can provide specific values of X and R to filter 2942,optionally configured to determine whether the event or frequency ofsoftware performance falls within this range. In some variants, thegradational norms can include one or more additional minima 2923relating to a resource consumed in the software performance.

Operation 4121 describes deciding whether to allow the software objectto execute in the other environment as a result of whether a leakagelarger than a threshold occurred in the emulation environment whilehosting the software object (e.g. routing logic 2646 deciding whether toroute object 2638 to environment 2681 at least partly based on whetherresource monitor detected a memory leakage rate 2627 or other leakageindicator larger than threshold 2629 in the emulation environment). Insome embodiments, for example, environment 2987 can implement theemulation environment. This can occur, for example, for example, inembodiments in which aggregation module 2900 (in one or more instances)performs operation 1010 and in which signaling module 2600 performsoperation 1020.

Operation 4124 describes accepting an external risk evaluation relatingto the software object (e.g. arbiter 2644 confirming that a trustedexternal system 9xx generated message 2623 or other informationassociating risk evaluation 2621 with identifier 2622 of software 2630or software object 2634). Such an evaluation can, for example, arriveeither a priori or after request logic 2645 transmits a request for suchinformation to such an external system. Arbiter 2644 can, in someembodiments, indicate that the software object did not conform with thegradational norm(s) in response to a high risk evaluation. Alternativelyor additionally, arbiter 2644 can be configured to respond to anexternal indication of moderate risk by cause the software to be testedby emulation within signaling module 2600.

Operation 4125 describes executing the software object at least partlynatively in the other environment (e.g. processor 2672 executing oneinstruction sequence 2631 of object 2633 natively and anotherinstruction sequence 2632 of object 2633 by emulation). This can occur,for example, in embodiments in which environment 2671 comprises theemulation environment and in which environment 2681 comprises the“other” (partially emulated) environment.

Operation 4127 describes causing the software object not to execute inthe other environment (e.g. firewall 2649 preventing object 2637 fromplacement or execution in environment 2681). Alternatively oradditionally, the prevention can be conditional or temporary, such as bycausing the placement or execution of object 2637 not to occur anywherein signaling module 2600 unless or until a suitably isolated environmentis created. Such implementations can occur, for example, in embodimentsin which signaling module 2600 performs operation 1020 or in whichaggregation module 2900 performs operation 1010.

Operation 4129 describes deciding whether to allow the software objectto execute in the other environment partly as a result of whether anerror occurred in the emulation environment while hosting the softwareobject (e.g. security logic 2648 deciding that environment 2681 will nothost object 2638 if exception handler 2647 detects a fatal error 2625from object 2638 or object 2635 in environment 2671). Alternatively oradditionally, in some variants of security logic 2648, whetherenvironment can host object 2638 can depend partly or entirely uponwhether object 2639 exists in environment 2671 or environment 2681.

With reference now to FIG. 42, there are shown several variants of theflow 1200 of FIG. 12. Operation 1270—signaling a decision whether totransfer any of the data to a second emulator at least partly as aresult of the first emulation environment hosting the software—mayinclude one or more of the following operations: 4273, 4274, 4276, or4278. Alternatively or additionally flow 1200 may likewise include oneor more of operations 4251, 4255, 4257, or 4258—each depicted afteroperation 1270 but optionally performed concurrently with it, or inother orders.

Operation 4273 describes deciding whether to transmit at least some ofthe data at least partly based on whether an anomaly apparently ariseswhile the first emulator hosts the software (e.g. security logic 2756deciding whether to transfer address or state information fromenvironment 2774 to environment 2784 based on the anomaly having arisenas environment 2774 hosts instruction sequence 2703 as process 2777).The decision may be based on prior knowledge that environment 2784 hasone or more uncertified services or other risk-indicative objects thatenvironment 2774 does not, for example, or some other indication thatenvironment 2784 is not as safe as environment 2774 in some aspect. Thedecision may likewise depend on other factors: whether any other objects2775 in environment 2774 include sensitive information, whether theanomaly is characteristic of malicious code, whether the destinationenvironment is more suitable for hosting sequence 2703, or the like.

In some variants, the source or destination environments can beconfigured with a security restriction that relates to the anomaly.Watermark data may be provided in response to an indication of improperreading, for example, as described herein. Resource access may likewisebe limited or denied in response to excessive loading. Conversely one ormore such restrictions may be omitted in a destination environment inresponse to a sufficient interval of trustworthy behavior or anindication that other software apparently cause the anomaly.

Operation 4274 describes selecting the second emulator at least partlyin response to the result of the first emulator hosting the software(e.g. router 2750 choosing among two or more emulators 2769, 2779 inresponse to result 2788 obtained from emulator 2789 hosting instructionsequence 2703). For example, router 2750 may generate selection 2752identifying one or more target emulators in response to an eventcategory or description arising in result 2788 (one emulator formalicious-code-indicative or memory-error-indicative results, anotherfor an absence of such an indication, e.g.). In some variants, selection2752 can specify emulator 2779, optionally with objects 2775 usable forerror analysis, in response to router 2750 detecting error indication2727 in result 2788. These configurations can occur, for example, inembodiments in which one or more instance of signaling module 2740perform operation 1270.

Operation 4276 describes deciding whether to transmit a portion of thedata from the first emulator hosting the software in response to anapparent defect in the software (e.g. filter 2754 transmitting some ofresult 2768 from emulator 2769 in response to defect-indicative eventdescriptors therein). Deterministic and non-progressive failures inemulator 2769 executing instruction sequence 2704, for example, canindicate one such type of apparent defect.

Operation 4278 describes selecting a portion of the data from the firstemulation environment hosting the software (e.g. mode logic 2847selecting portion 2808 of data 2809). In some embodiments, portion 2808can include one or more data segments of raw data, for example, or oneor more evaluations or other distillations of raw data. The portion canbe a portion to be transferred or a portion used in deciding whether totransfer some of the data as described herein, for example. In anothermode of performing operation 1270, of course, the decision signalswhether to transfer the whole of the data 2809 and depends upon eachportion of the obtained data.

Operation 4251 describes implementing the first emulator and the secondemulator on a single common substrate (e.g. processor 2762 and processor2772 respectively implementing emulator 2769 and emulator 2779 on asingle chip). In some embodiments, system 2700 can be implemented on asingle shared chip, for example.

Operation 4255 describes storing one or more portions of the data (e.g.storage module 2711 copying at least some of the data to non-volatilemedium 2712). Alternatively or additionally, the decision or otherinformation derived from the data can be stored in or on the medium. Insome variants, such information can be used in or as an operationalhistory. The history can be arranged and stored, for example, as alookup table from which a retrieval function returns a historicalperformance indicator accessed according to an object type and anemulation configuration.

Operation 4257 describes causing the second emulator to host at least aportion of the software (e.g. allocation logic 2718 causing emulator2769 to execute instruction sequence 2702). In some contexts, suchexecutions can occur before, during, interleaved with, or depending uponthe data transmission. Alternatively or additionally, the manner ofexecution can be affected by the content of data transmitted in someembodiments. In one instance, the data can affect a configuration ofemulator 2769 such as by defining or refining one or more of theresources or checkpoints of emulation. Likewise, the data can optionallydefine events or other software objects 2765 speculatively relating to aresult of instruction sequence 2701 executing in environment 2764. See,e.g., Michael E. Locasto et al. (“Speculative Execution as an OperatingSystem Service”) athttp://mice.cs.columbia.edu/getTechreport.php?techreportID=407.

Operation 4258 describes deciding whether to cause the second emulatorto use a security restriction used by the first emulator in hosting thesoftware (e.g. invocation module 2715 instructing emulator 2789 to omitthe security restriction in response to result 2778 indicating thatsoftware 2706 appeared to be trustworthy in environment 2774). This canoccur, for example, in embodiments in which signaling module 2740performs operation 1270, in which emulator 2779 implements the “first”emulator (operable with security restriction 2716), and in whichemulator 2789 implements the “second” emulator (operable with or withoutsecurity restriction 2716).

With reference now to FIG. 43, there are shown several variants of theflow 1200 of FIG. 12 or 42. Operation 1210—obtaining data from a firstemulator and from a first emulation environment hosting software—mayinclude one or more of the following operations: 4312, 4313, or 4315.Alternatively or additionally flow 1200 may likewise include one or moreof operations 4342, 4343, 4345, or 4347—each depicted after operation1270 but optionally performed concurrently with it, or in other orders.

Operation 4312 describes deciding whether to increase a trust level ofthe software in response to the first emulation environment hosting thesoftware (e.g. evaluation module 2815 adjusting a default or other priorevaluation 2807 in data 2809 to indicate a higher trust level inassociation with sequence 2866). This can occur, for example, inresponse to one or more of sequence 2866, session 2867, user 2868, orother aspect of environment 2864 performing consistently with arespective behavior model, such as by manifesting an error rate below anominal threshold, by completing tasks on time, by performing a requiredamount of work, or by meeting one or more other performance-indicativerequirements 2816.

Operation 4313 describes receiving a first portion of the data from thefirst emulator and a second portion of the data from the first emulationenvironment hosting the software (e.g. port 2818 receiving segment C025from emulator 2879 and segment C024 from sequence 2876 or otherwise fromwithin environment 2874). This can occur, for example, in embodiments inwhich one or more portions of system 2800 perform operation 1210 and inwhich (one or more) signaling modules 2740, 2840 perform operation 1270.In some variants, the data can likewise include logical or arithmeticcombinations or other hybrids of such portions: a Boolean indication ofwhether any of the portions indicated an error, a count of them, atextual summary, or the like.

Operation 4315 describes causing a processor to emulate a first portionof the software in the first emulation environment and to host a secondportion of the software natively (e.g. task manager 2817 triggeringprocessor 2892 to generate respective portions of data 2809 fromsoftware sequence 2892 in environment 2891 and from software sequence2895 in environment 2894). This can occur, for example, in variants inwhich environment 2891 is emulated and in which environment 2894 isnative, or vice versa. In some embodiments, a hosting mode for each ofthe sequences 2892, 2895 is selected at least partly based on an earlieriteration of operation 1210.

Operation 4342 describes hosting other software via the second emulator(e.g. processor 2882 causing emulator 2889 to host at least sequences2886, 2887 in environment 2874). This can occur, for example, inembodiments in which emulators 2879, 2889 are the “first” and “second”emulators respectively, and in which sequence 2887 is not used inenvironment 2874. Operation 4342 can be diagnostically useful, forexample, in a context in which either of sequences these sequences issuspected of affecting the other, in which either lacks a suitablecertification, in which either is or resembles software of criticalimportance, or the like.

Operation 4343 describes indicating at least a trust level of thesoftware in the result of the first emulator hosting the software (e.g.analyzer 2940 generating level 2919 of trust as an integer or otherevaluation of the behavior of segment 2912 in environment 2774). See,e.g., U.S. Pat. Pub. No. 2005/0066195 (“Factor Analysis of InformationRisk”) filed 6 Aug. 2004. Alternatively or additionally, such anevaluation from analyzer 2940 can be used as a determinant in making thedecision of operation 1270.

Operation 4345 describes causing the second emulator to host thesoftware and other software in a second emulation environment (e.g.processor 2882 causing emulator 2889 to host sequence 2876 with sequence2888). This can occur, for example, in embodiments in which operation1210 includes environment 2874 hosting sequence 2876 but not sequence2888, in which one or more portions of system 2800 perform operation1210, and in which signaling modules 2740, 2840 perform operation 1270.

Operation 4347 describes selecting other software in response to thefirst emulation environment hosting the software (e.g. selection logic2814 selecting sequence 2877 in response to environment 2894 hostingsequence 2895). The selection of sequence 2877 over sequence 2878 orother software for use in environment 2874 can be based on the actual orintended presence of sequence 2877 in another environment. The otherenvironment may be a physical environment in which the software (ofoperation 1210, e.g.) may need to coexist with sequence 2877, forexample, or may be an environment in which an anomaly as describedherein has been detected in the presence of sequence 2877.

With reference now to FIG. 44, there are shown several variants of theflow 1200 of FIG. 12, 42, or 43. Operation 1210—obtaining data from afirst emulator and from a first emulation environment hostingsoftware—may include one or more of the following operations: 4411,4415, 4416, or 4419. Operation 1270—signaling a decision whether totransfer any of the data to a second emulator at least partly as aresult of the first emulation environment hosting the software—mayinclude one or more of the following operations: 4472, 4473, 4474, 4478,or 4479.

Operation 4411 describes receiving one or more invocation parameters inthe data (e.g. input 2950 receiving message 2952 indicating a functionor procedure call with at least one numeric or other parameter 2902 asprovided to invoke software 2909). In some embodiments, such parameterscan likewise be received after such a call is performed, optionally aselements of state information as described herein.

Operation 4415 describes obtaining at least one successful result fromthe software in the data (e.g. sensor 2944 detecting a normal completionof a program call, a normal computation result, or other condition 2918not indicative of an execution fault or process suspension). This canoccur, for example, in embodiments in which (at least) aggregationmodule 2900 performs operation 1210.

Operation 4416 describes receiving a malicious code indication in thedata (e.g. sensor 2945 detecting a pattern 2915 in data 2916 indicativeof a known virus or worm). Other conditions can sometimes constitute amalicious code indication 2917, such as an aggressive behavior (makingunauthorized contacts, prolific loading, self-modifying code, or thelike) or a worsening and nondeterministic pattern of performance. Insome embodiments, at least one sensor 2946 is configured to detect suchbehavioral indications.

Operation 4419 describes receiving a suboptimal completion indication inthe data (e.g. analyzer 2940 detecting a data or timing patternindicative of a sequence 2901 performing worse than a benchmark 2943 ofperformance for the sequence 2901 under like conditions). Analyzer 2940can, for example, be configured to detect a completion time relative toa best completion time, a correct or normal completion percentage, or tosome other suitable benchmark known in the art or suggested herein.

Operation 4472 describes transferring at least partial control of amedium containing at least some of the data to the second emulator (e.g.media manager 2744 mapping storage or memory region 2723 containing datasegment 2722 into environment 2784 as a mode of transferring parametervalue 2721 of segment 2722 from environment 2764). Optionally,environment 2764 can maintain full or partial access to region tofacilitate other data transfer even after operation 4472.

Operation 4473 describes causing the second emulator to generate asecond emulation environment using the data from the first emulator andfrom the first emulation environment hosting the software (e.g. controlmodule 2742 triggering emulator 2789 to create environment 2784 as avariant of environment 2774 according to parameters received fromemulator 2779). This can occur, for example, in embodiments in whichsignaling module 2740 includes an instance of control module 2742 and isoperable to perform at least operation 1270. Such parameters or otherdata 2720 can optionally include one or more of emulation parameters ofenvironment 2774, invocation modes or other inputs to the software,outcome information, or the like, as described herein. In some variants,a common portion of software 2706 is permitted to executecontemporaneously (overlapping or interleaving in time, e.g.) in two ormore such environments 2774, 2784.

Operation 4474 describes transferring to the second emulator a portionof the data comprising at least state information relating to thesoftware (e.g. stack manager 2743 and processor 2782 cooperativelytransferring a call sequence or other state information from emulator2789 from stack 2728 to another emulator). This can occur, for example,in embodiments in which aggregation logic 2719 and machine 2780 jointlyperform operation 1210, and in which at least signaling module 2740performs operation 1270.

Operation 4478 describes requesting to transfer information to thesecond emulator (e.g. request logic 2758 sending request 2759 to one ormore of emulator 2769, emulator 2779, or server 2755). Such a requestcan be sent, in some embodiments, in preparation for signaling thedecision. Alternatively or additionally, the request itself may affector signal the decision to proceed with the transfer. In some variants,for example, the decision will depend upon request logic 2758 receivingsuitable transfer authorization in a reply from server 2755 or emulator2779. See, e.g., U.S. Pat. Pub. No. 2006/0259947 (“Method for enforcinga Java security policy in a multi virtual machine system”) filed 11 May2005.

Operation 4479 describes transferring information about atransfer-triggering event to the second emulator (e.g. event monitor2748 sending emulator 2747 an event category or other indication 2746 ofwhat event(s) triggered the decision to transfer the data). Thetransfer-triggering event can include an operational result, a datapattern match, a timeout, a fault or other interrupt, or the like, asdescribed herein.

With reference now to FIG. 45, there are shown several variants of theflow 1400 of FIG. 14. Operation 1460—obtaining a decision whether tohost an instruction sequence in an emulation environment at least inresponse to an evaluation of software containing the instructionsequence—may include one or more of the following operations: 4561,4563, 4564, 4566, or 4567. Operation 1480—causing another environment tohost the instruction sequence in response to the decision whether tohost the instruction sequence in the emulation environment—may includeone or more of the following operations: 4582, 4584, 4585, or 4589.

Operation 4561 describes compiling at least the instruction sequence(e.g. compiler 3192 generating error data 3193 while compilinginstruction sequence 3103 from source code or into machine code). See,e.g., U.S. Pat. Pub. No. 2004/0103406 (“Method and Apparatus forAutonomic Compiling of a Program”) filed 21 Nov. 2002; and U.S. Pat.Pub. No. 2002/0129335 (“Robust Logging System for Embedded Systems forSoftware Compilers”) filed 18 Dec. 2000. Alternatively or additionally,execution-time data (e.g. errors, resource usages, program results,state data, or the like) can be reflected or used in decisions of whereor how the instruction sequence will be hosted.

Operation 4563 describes receiving a message about the softwarecontaining the instruction sequence (e.g. port 3121 receiving warnings,recommendations, evaluations, or other input 3124 as described hereinabout software 3107). Such input can be received via interface 3120 inthe embodiment of FIG. 31, as a computer-readable reputation-indicativerecord, a human-readable warning, sample output from the software, orthe like. In some embodiments, a certificate or other trust levelindicator relating to the source (device or other party) can likewise bereceived via interface 3120.

Operation 4564 describes evaluating the software containing theinstruction sequence (e.g. rule checker 3196 counting errors in one ormore categories arising while executing or otherwise analyzing thesoftware). Alternatively or additionally, the evaluation can provide orautomatically result from evaluation data or subjective input fromothers. See, e.g., U.S. Pat. Pub. No. 2003/0046665 (“Reusable SoftwareComponent for Textually Supplementing, Modifying, Evaluating andProcessing Procedural Logic for a Compiled Host Program at Run-Time”)filed 28 Feb. 2001; U.S. Pat. Pub. No. 2003/0056151 (“SoftwareEvaluation System, Software Evaluation Apparatus, Software EvaluationMethod, Recording Medium, and Computer Data Signal”) filed 18 Sep. 2002;and U.S. Pat. Pub. No. 2006/0253824 (“Software Evaluation Method andSoftware Evaluation System”) filed 5 Apr. 2006. Those skilled in the artwill recognize a variety of techniques for combining such evaluationdata, such as by logical or arithmetic combination, in light of theseteachings.

Operation 4566 describes responding to a risk indicator relating atleast to the software containing the instruction sequence (e.g. policyimplementation circuitry 3198 using a default sandbox configuration forinstruction sequence 3104 that is not used for other instructionsequences that are suitable for use with critical data). Alternativelyor additionally, the implementation circuitry can include a componentfor migrating or reconfiguring instruction sequence 3104 automaticallyfrom one configuration to another at or after an appropriate interval: aminute, an hour, a day, a month, or a year, for example.

Operation 4567 describes hosting the software containing the instructionsequence in the emulation environment (e.g. processor 3172 controllablyexecuting sequence 3103 and sequence 3176 in environment 3174). Themanner of execution can be a part of the decision, in some embodiments,such as those in which sequence 3103 obtains access to a resource thatsequence 3176 does not, in response to the evaluation. (As describedherein, such conditionally-accessible resources can include storagemedia or other peripheral devices accessible through a network linkage,for example.)

Operation 4582 describes deciding to host the instruction sequence inthe other environment without first completing the instruction sequencein the emulation environment (e.g. task manager 3058 spawning a processcontaining at least an instance of instruction sequence 3004 in each ofenvironment 3094 and environment 3074 so that the two overlap in time).Alternatively or additionally, process 3097 can begin execution ofsequence 3004 after one or more successful iterations of sequence 3004in process 3077. This can occur, for example, in variants in whichmachine 3090 is configured so that environment 3094 is partly or fullyemulated by emulator 3099, as well as variant in which processor 3092performs sequence 3004 without emulator 3099 (natively). This can occur,for example, in embodiments in which evaluation module 3050 can performoperation 1460 and in which at least the above-mentioned other portionsof system 3000 perform operation 1480.

Operation 4584 describes causing the other environment to host theinstruction sequence while the emulation environment hosts theinstruction sequence (e.g. invocation logic 3051 causing processor 3092to execute instruction sequence 3096 while processor 3072 executesinstruction sequence 3076). This can occur, for example, in stand-aloneembodiments of system 3000 as well as those in which primary system 1310and external system 1340 each include a respective instance of system3000 in mutual cooperation.

Operation 4585 describes deciding to host the software containing theinstruction sequence in the other environment (e.g. host controlcircuitry 3056 deciding that primary system 1310 will host at leastsequence 1301 in environment 1384 in lieu of or in concert withenvironment 1374 hosting an instance of sequence 1301). This can occur,for example, in embodiments in which at least one instance of evaluationmodule 1350 is configured to perform operation 1460 and in which aninstance of system 3000 configured to perform operation 1480 is embodiedin primary system 1310. In many variants described herein, suchdecisions can be temporary or otherwise provisional: depending on one ormore of an apparent safety, timing, content, reputation, behavior,circumstances, analysis, or outcome of instruction sequence 1301 or itsexecution. In variants in which the software evaluation is alsoobtained, for example, it can be used to decide how the otherenvironment hosts the instruction sequence (e.g. by executing softwarein a batch mode in response to an evaluation is “slow” or otherwise runslonger than a threshold duration). The software evaluation can alsoaffect other decisions, such as which environment is used to host theinstruction sequence (e.g. by routing one or more sequences having arisk-indicative evaluation to the “other” environment and one or moresequences having a non-risk-indicative evaluation to a thirdenvironment).

Operation 4589 describes selecting the other environment at least partlybased on the software containing the instruction sequence (e.g. servicerouter 3052 selecting environment 3094 over other environments for usewith instruction sequence 3001 in response to one or more environmentalattributes identified for use with software 3006). The attributes caninclude memory or other resource availability, diagnostic utility, loadlevel or content, or the like. In some embodiments, two or moreenvironments are selected from a field of several candidate environmentsfor hosting sequence of a given class (e.g. at-risk software, softwarewith no local history, or the like as described herein).

With reference now to FIG. 46, there are shown several variants of theflow 1400 of FIG. 14 or 45. Operation 1460—obtaining a decision whetherto host an instruction sequence in an emulation environment at least inresponse to an evaluation of software containing the instructionsequence—may include one or more of the following operations: 4662,4663, 4666, 4667, or 4669. The instruction sequence can, for example,comprise sequence 1725 or the like, optionally including one or moreother sequences as described herein. Operation 1480—causing anotherenvironment to host the instruction sequence in response to the decisionwhether to host the instruction sequence in the emulationenvironment—may include one or more of the following operations: 4681,4683, 4687, or 4688.

Operation 4662 describes deciding to host the instruction sequence inthe emulation environment at least partly in response to the softwareapparently causing an error (e.g. security logic 3197 quarantininginstruction sequence 3101 in environment 3174 in response to detectingan illegal operation or other fault event therein). In variousembodiments, the hosted instruction sequence can include one or more ofsuch illegal operations, entire software modules, newly-receivedsequences, all write instructions, periodically sampled portions ofsoftware 3101, or the like.

Operation 4663 describes determining whether a fault from the softwarecontaining the instruction sequence apparently repeats (e.g. testinglogic 3195 evaluating instruction sequence 3103 by re-executing sequence3103 in a state as it was before generating error data 3194, andcomparing the re-execution result set with error data 3194 or otherreference data). Alternatively or additionally, comparative parameterscan be obtained with execution parameters incrementally or otherwisesystematically varied. See, e.g., Feng Qin et al. (“Rx: Treating Bugs asAllergies—A Safe Method to Survive Software Failures”) in Proceedings ofthe Symposium on Systems and Operating Systems Principles (2005).Evaluations that include “repeatable,” “memory fault,” or other faultcategories or attributes can be used in deciding whether or how toselect, characterize, analyze or quarantine instruction sequences inlight of these teachings.

Operation 4666 describes executing the instruction sequence withwatermark data in the emulation environment (e.g. emulator 3178executing instruction sequence 3101 in environment 3174 thatsimultaneously contains watermark data 3129). The use of such data canfacilitate detection of malicious code that copies or alters watermarkdata 3129 within environment 3174. In some embodiments, watermark data3129 can be formatted to resemble a table, list, or executable code.Alternatively or additionally, one or more copies of distinctivenaturally-occurring data (in one or more software objects 3106, e.g.)are effectively preserved for later use so that the naturally-occurringdata effectively becomes watermark data.

Operation 4667 describes executing a portion of the software natively ina physical environment (e.g. core 3189 natively executing one or moreinstances of instruction sequence 3102 of software 3107). By hostingonly a portion natively, the use or evaluation of software 3107 canoptionally be streamlined relative to fully emulated configurations.Alternatively or additionally, in some contexts, some species ofmalicious behaviors or other defects may be manifested and detected inpartly-native configurations that can otherwise remain undetectable.

Operation 4669 describes implementing a virtual processor in theemulation environment (e.g. emulator 3179 supporting one or more virtualinstances of processor 3062 in environment 3174, each performingrespective processes 3177). In some embodiments, the decision can causetwo or more virtual processors each executing a respective instance ofinstruction sequence 3176, optionally in respective environments.

Operation 4681 describes deciding not to host the instruction sequencein the other environment at least partly in response to the softwarecontaining the instruction sequence causing an error (e.g. intrusionprotection logic 3057 preventing or terminating a reception or executionof sequence 3001 in environment 1384 in response to detecting an illegalread or write operation or other error while sequence 3001 executes inenvironment 1374). In some embodiments, the decision “not to host” canbe reversed in response to determining that other code (other thansequence 3001, e.g.) apparently caused the error(s) or otherwisedetermining that software 3006 to which the decision pertains isapparently not at fault.

Operation 4683 describes executing the instruction sequence natively inthe other environment (e.g. machine 3080 natively executing instructionsequence 3002 in lieu of processor 3072 executing instruction sequence3003 in a virtual machine). In some other embodiments, machine 3080 canbe configured to host instruction sequence 3001 natively wheneverinstruction sequence 3001 is deemed suitable for execution machine 3070,and machine 3070 can analyze instruction sequence 3001 and perhapsdetect bugs or malicious code in a manner that is invisible to the user.

Operation 4687 describes implementing checkpointing in the otherenvironment (e.g. emulator 3089 permitting or defining one or morecheckpoints 3009 within or between executions of instruction sequence3086 in environment 3084). The checkpointing may be derived from userinputs, instances of a module or instruction class, shortly before orafter an error location in a prior execution of the sequence, at randomintervals, or the like.

Operation 4688 describes performing one or more iterative operationsbefore causing the other environment to host the instruction sequence(e.g. detection logic 3054 deciding whether to perform an iteration ofinstruction sequence 3076 in environment 3074 based on an outcome of aloop's conditional statement). The conditional statement can depend onone or more of an iteration count or other timing logic 3007, errorpattern 3008 or lack thereof, user input validating the software'sbehavior in the emulation environment, or the like.

With reference now to FIG. 47, there are shown several variants of theflow 1600 of FIG. 16. Operation 1640—obtaining a decision whether tohost an instruction sequence natively in a physical environment inresponse to an operational history of software apparently containing theinstruction sequence—may include one or more of the followingoperations: 4744, 4745, 4747, or 4748. Operation 1650—signaling adecision whether to cause an emulation environment to host theinstruction sequence in response to the decision whether to host theinstruction sequence natively in the physical environment—may includeone or more of the following operations: 4752, 4754, 4756, or 4758.

Operation 4744 describes aggregating the operational history of thesoftware according to one or more software object identifiers of thesoftware (e.g. aggregator 3291 receiving and storing software objectidentifiers, version numbers, functional descriptions, code sources orthe like in association with operational data such execution outcomes,platform information, information source identifiers, execution times,resource availabilities, or the like as event data 3292). In someembodiments, a resulting operational history 3255 can likewise includeone or more risk evaluations, certifications, or other message(s) 3228in association with various software 3207 or environment(s) as describedherein.

Operation 4745 describes deciding whether to host the instructionsequence natively in the physical environment by applying one or morerisk evaluation criteria to the operational history of the softwareapparently containing the instruction sequence (e.g. risk evaluationlogic 3299 allowing processor 3282 to host sequence 3202 natively onlyafter determining that prior usage of sequence 3202 or other software3207 has apparently not generated excessive or severe errors locally).Alternatively or additionally, some or all of software 3207 can beevaluated directly, optionally in an emulation environment as describedherein.

Operation 4747 describes obtaining the instruction sequence (e.g. port3222 receiving source code 3204 or machine code 3205 operable forexecution or other evaluation for facilitating the decision).Alternatively or additionally, decision module 1530 can use input 3224received via interface 3220 or the like in deciding whether to host theinstruction sequence natively. This can occur, for example, inembodiments in which decision module 3230 performs operation 1640 and inwhich signaling module 3250 performs operation 1650. In other instances,the decision is received externally—as decision 1525 via interface 1520,e.g. This can occur, for example, in embodiments in which interface 1520performs operation 1640 and in which processor 1572 performs operation1650.

Operation 4748 describes receiving a signal containing the decisionwhether to host the instruction sequence natively in the physicalenvironment in response to the operational history of the softwareapparently containing the instruction sequence (e.g. network linkage3221 receiving machine code 3205 implementing or otherwise conveyingdecision 3235 from an external source). Decision 3235 can likewise bereceived, in some embodiments, as a user input, for example via a localor remote interface 3220 as described herein.

Operation 4752 describes implementing at least a virtual memory in theemulation environment (e.g. memory manager 3254 creating at least onecontiguous virtual memory 3276 in environment 3274 from two or more realmemory or storage spaces). Alternatively or additionally, the emulationenvironment 3274 can include virtual processor 3277.

Operation 4754 describes deciding to cause the emulation environment tohost the instruction sequence without first hosting the instructionsequence natively in the physical environment (e.g. intake circuitry3251 routing at least instruction sequence 3201 to environment 3274 inresponse to an indication that instruction sequence 3201 is new).Alternatively or additionally, an emulation of instruction sequence 3201can occur (in environment 3264, e.g.) before or during a nativeexecution (in environment 3284, e.g.) as a security precaution,optionally in response receiving one or more risk indicators asdescribed herein. (In some embodiments, an “indication of” an event orcircumstance can include one or more of a categorization,identification, evaluation, notification, prediction, outcome,distillation, or the like relating to any potential or actualinstance(s) of the event or circumstance.)

Operation 4756 describes providing data to the operational history atleast partly based on the emulation environment hosting the softwareapparently containing the instruction sequence (e.g. emulator 3279routing output 3278 from emulation environment 3274 so that operationalhistory 3255 can record at least the hosting decision). In someembodiments, output 3278 can likewise signal circumstances or results ofthe hosting as described herein.

Operation 4758 describes displaying an indication of the decisionwhether to cause the emulation environment to host the instructionsequence (e.g. user interface 3220 notifying a user that some or all ofsoftware is being screened or otherwise analyzed). In a network context,for example, such analysis can also include distributing an inquiryabout risk indicators such as whether software has been hosted insystems that have since experienced errors.

The foregoing detailed description has set forth various embodiments ofthe devices and/or processes via the use of block diagrams, flowcharts,and/or examples. Insofar as such block diagrams, flowcharts, and/orexamples contain one or more functions and/or operations, it will beunderstood by those within the art that each function and/or operationwithin such block diagrams, flowcharts, or examples can be implemented,individually and/or collectively, by a wide range of hardware, software,firmware, or virtually any combination thereof. In one embodiment,several portions of the subject matter described herein may beimplemented via Application Specific Integrated Circuits (ASICs), FieldProgrammable Gate Arrays (FPGAs), digital signal processors (DSPs), orother integrated formats. However, those skilled in the art willrecognize that some aspects of the embodiments disclosed herein, inwhole or in part, can be equivalently implemented in integratedcircuits, as one or more computer programs running on one or morecomputers (e.g., as one or more programs running on one or more computersystems), as one or more programs running on one or more processors(e.g., as one or more programs running on one or more microprocessors),as firmware, or as virtually any combination thereof, and that designingthe circuitry and/or writing the code for the software and or firmwarewould be well within the skill of one of skill in the art in light ofthis disclosure. In addition, those skilled in the art will appreciatethat the mechanisms of the subject matter described herein are capableof being distributed as a program product in a variety of forms, andthat an illustrative embodiment of the subject matter described hereinapplies regardless of the particular type of signal bearing medium usedto actually carry out the distribution. Examples of a signal bearingmedium include, but are not limited to, the following: a recordable typemedium such as a floppy disk, a hard disk drive, a Compact Disc (CD), aDigital Video Disk (DVD), a digital tape, a computer memory, etc.; and atransmission type medium such as a digital and/or an analogcommunication medium (e.g., a fiber optic cable, a waveguide, a wiredcommunications link, a wireless communication link, etc.).

In a general sense, those skilled in the art will recognize that thevarious embodiments described herein can be implemented, individuallyand/or collectively, by various types of electro-mechanical systemshaving a wide range of electrical components such as hardware, software,firmware, or virtually any combination thereof; and a wide range ofcomponents that may impart mechanical force or motion such as rigidbodies, spring or torsional bodies, hydraulics, and electro-magneticallyactuated devices, or virtually any combination thereof. Consequently, asused herein “electro-mechanical system” includes, but is not limited to,electrical circuitry operably coupled with a transducer (e.g., anactuator, a motor, a piezoelectric crystal, etc.), electrical circuitryhaving at least one discrete electrical circuit, electrical circuitryhaving at least one integrated circuit, electrical circuitry having atleast one application specific integrated circuit, electrical circuitryforming a general purpose computing device configured by a computerprogram (e.g., a general purpose computer configured by a computerprogram which at least partially carries out processes and/or devicesdescribed herein, or a microprocessor configured by a computer programwhich at least partially carries out processes and/or devices describedherein), electrical circuitry forming a memory device (e.g., forms ofrandom access memory), electrical circuitry forming a communicationsdevice (e.g., a modem, communications switch, or optical-electricalequipment), and any non-electrical analog thereto, such as optical orother analogs. Those skilled in the art will also appreciate thatexamples of electro-mechanical systems include but are not limited to avariety of consumer electronics systems, as well as other systems suchas motorized transport systems, factory automation systems, securitysystems, and communication/computing systems. Those skilled in the artwill recognize that electro-mechanical as used herein is not necessarilylimited to a system that has both electrical and mechanical actuationexcept as context may dictate otherwise.

In a general sense, those skilled in the art will recognize that thevarious aspects described herein which can be implemented, individuallyand/or collectively, by a wide range of hardware, software, firmware, orany combination thereof can be viewed as being composed of various typesof “electrical circuitry.” Consequently, as used herein “electricalcircuitry” includes, but is not limited to, electrical circuitry havingat least one discrete electrical circuit, electrical circuitry having atleast one integrated circuit, electrical circuitry having at least oneapplication specific integrated circuit, electrical circuitry forming ageneral purpose computing device configured by a computer program (e.g.,a general purpose computer configured by a computer program which atleast partially carries out processes and/or devices described herein,or a microprocessor configured by a computer program which at leastpartially carries out processes and/or devices described herein),electrical circuitry forming a memory device (e.g., forms of randomaccess memory), and/or electrical circuitry forming a communicationsdevice (e.g., a modem, communications switch, or optical-electricalequipment). Those having skill in the art will recognize that thesubject matter described herein may be implemented in an analog ordigital fashion or some combination thereof.

Those skilled in the art will recognize that it is common within the artto describe devices and/or processes in the fashion set forth herein,and thereafter use engineering practices to integrate such describeddevices and/or processes into image processing systems. That is, atleast a portion of the devices and/or processes described herein can beintegrated into an image processing system via a reasonable amount ofexperimentation. Those having skill in the art will recognize that atypical image processing system generally includes one or more of asystem unit housing, a video display device, a memory such as volatileand non-volatile memory, processors such as microprocessors and digitalsignal processors, computational entities such as operating systems,drivers, and applications programs, one or more interaction devices,such as a touch pad or screen, control systems including feedback loopsand control motors (e.g., feedback for sensing lens position and/orvelocity; control motors for moving/distorting lenses to give desiredfocuses. A typical image processing system may be implemented utilizingany suitable commercially available components, such as those typicallyfound in digital still systems and/or digital motion systems.

Those skilled in the art will recognize that it is common within the artto describe devices and/or processes in the fashion set forth herein,and thereafter use engineering practices to integrate such describeddevices and/or processes into data processing systems. That is, at leasta portion of the devices and/or processes described herein can beintegrated into a data processing system via a reasonable amount ofexperimentation. Those having skill in the art will recognize that atypical data processing system generally includes one or more of asystem unit housing, a video display device, a memory such as volatileand non-volatile memory, processors such as microprocessors and digitalsignal processors, computational entities such as operating systems,drivers, graphical user interfaces, and applications programs, one ormore interaction devices, such as a touch pad or screen, and/or controlsystems including feedback loops and control motors (e.g., feedback forsensing position and/or velocity; control motors for moving and/oradjusting components and/or quantities). A typical data processingsystem may be implemented utilizing any suitable commercially availablecomponents, such as those typically found in datacomputing/communication and/or network computing/communication systems.

Those skilled in the art will recognize that it is common within the artto implement devices and/or processes and/or systems in the fashion(s)set forth herein, and thereafter use engineering and/or businesspractices to integrate such implemented devices and/or processes and/orsystems into more comprehensive devices and/or processes and/or systems.That is, at least a portion of the devices and/or processes and/orsystems described herein can be integrated into other devices and/orprocesses and/or systems via a reasonable amount of experimentation.Those having skill in the art will recognize that examples of such otherdevices and/or processes and/or systems might include—as appropriate tocontext and application—all or part of devices and/or processes and/orsystems of (a) an air conveyance (e.g., an airplane, rocket, hovercraft,helicopter, etc.), (b) a ground conveyance (e.g., a car, truck,locomotive, tank, armored personnel carrier, etc.), (c) a building(e.g., a home, warehouse, office, etc.), (d) an appliance (e.g., arefrigerator, a washing machine, a dryer, etc.), (e) a communicationssystem (e.g., a networked system, a telephone system, a Voice over IPsystem, etc.), (f) a business entity (e.g., an Internet Service Provider(ISP) entity such as Comcast Cable, Quest, Southwestern Bell, etc), or(g) a wired/wireless services entity such as Sprint, Cingular, Nextel,etc.), etc.

All of the above-mentioned U.S. patents, U.S. patent applicationpublications, U.S. patent applications, foreign patents, foreign patentapplications and non-patent publications referred to in thisspecification and/or listed in any Application Data Sheet, areincorporated herein by reference, to the extent not inconsistentherewith.

One skilled in the art will recognize that the herein describedcomponents (e.g., steps), devices, and objects and the discussionaccompanying them are used as examples for the sake of conceptualclarity and that various configuration modifications are within theskill of those in the art. Consequently, as used herein, the specificexemplars set forth and the accompanying discussion are intended to berepresentative of their more general classes. In general, use of anyspecific exemplar herein is also intended to be representative of itsclass, and the non-inclusion of such specific components (e.g., steps),devices, and objects herein should not be taken as indicating thatlimitation is desired.

Although users 133, 333, 2868 are shown/described herein each as asingle illustrated figure, those skilled in the art will appreciate thatsuch users may be representative of a human user, a robotic user (e.g.,computational entity), and/or substantially any combination thereof(e.g., a user may be assisted by one or more robotic agents). Inaddition, each such user, as set forth herein, although shown as asingle entity may in fact be composed of two or more entities. Thoseskilled in the art will appreciate that, in general, the same may besaid of “sender” and/or other entity-oriented terms as such terms areused herein.

With respect to the use of substantially any plural and/or singularterms herein, those having skill in the art can translate from theplural to the singular and/or from the singular to the plural as isappropriate to the context and/or application. The varioussingular/plural permutations are not expressly set forth herein for sakeof clarity.

The herein described subject matter sometimes illustrates differentcomponents contained within, or connected with, different othercomponents. It is to be understood that such depicted architectures aremerely exemplary, and that in fact many other architectures can beimplemented which achieve the same functionality. In a conceptual sense,any arrangement of components to achieve the same functionality iseffectively “associated” such that the desired functionality isachieved. Hence, any two components herein combined to achieve aparticular functionality can be seen as “associated with” each othersuch that the desired functionality is achieved, irrespective ofarchitectures or intermedial components. Likewise, any two components soassociated can also be viewed as being “operably connected”, or“operably coupled”, to each other to achieve the desired functionality,and any two components capable of being so associated can also be viewedas being “operably couplable”, to each other to achieve the desiredfunctionality. Specific examples of operably couplable include but arenot limited to physically mateable and/or physically interactingcomponents and/or wirelessly interactable and/or wirelessly interactingcomponents and/or logically interacting and/or logically interactablecomponents.

While particular aspects of the present subject matter described hereinhave been shown and described, it will be apparent to those skilled inthe art that, based upon the teachings herein, changes and modificationsmay be made without departing from the subject matter described hereinand its broader aspects and, therefore, the appended claims are toencompass within their scope all such changes and modifications as arewithin the true spirit and scope of the subject matter described herein.Furthermore, it is to be understood that the invention is defined by theappended claims. It will be understood by those within the art that, ingeneral, terms used herein, and especially in the appended claims (e.g.,bodies of the appended claims) are generally intended as “open” terms(e.g., the term “including” should be interpreted as “including but notlimited to,” the term “having” should be interpreted as “having atleast,” the term “includes” should be interpreted as “includes but isnot limited to,” etc.). It will be further understood by those withinthe art that if a specific number of an introduced claim recitation isintended, such an intent will be explicitly recited in the claim, and inthe absence of such recitation no such intent is present. For example,as an aid to understanding, the following appended claims may containusage of the introductory phrases “at least one” and “one or more” tointroduce claim recitations. However, the use of such phrases should notbe construed to imply that the introduction of a claim recitation by theindefinite articles “a” or “an” limits any particular claim containingsuch introduced claim recitation to inventions containing only one suchrecitation, even when the same claim includes the introductory phrases“one or more” or “at least one” and indefinite articles such as “a” or“an” (e.g., “a” and/or “an” should typically be interpreted to mean “atleast one” or “one or more”); the same holds true for the use ofdefinite articles used to introduce claim recitations. In addition, evenif a specific number of an introduced claim recitation is explicitlyrecited, those skilled in the art will recognize that such recitationshould typically be interpreted to mean at least the recited number(e.g., the bare recitation of “two recitations,” without othermodifiers, typically means at least two recitations, or two or morerecitations). Furthermore, in those instances where a conventionanalogous to “at least one of A, B, and C, etc.” is used, in generalsuch a construction is intended in the sense one having skill in the artwould understand the convention (e.g., “a system having at least one ofA, B, and C” would include but not be limited to systems that have Aalone, B alone, C alone, A and B together, A and C together, B and Ctogether, and/or A, B, and C together, etc.). In those instances where aconvention analogous to “at least one of A, B, or C, etc.” is used, ingeneral such a construction is intended in the sense one having skill inthe art would understand the convention (e.g., “a system having at leastone of A, B, or C” would include but not be limited to systems that haveA alone, B alone, C alone, A and B together, A and C together, B and Ctogether, and/or A, B, and C together, etc.). It will be furtherunderstood by those within the art that virtually any disjunctive wordand/or phrase presenting two or more alternative terms, whether in thedescription, claims, or drawings, should be understood to contemplatethe possibilities of including one of the terms, either of the terms, orboth terms. For example, the phrase “A or B” will be understood toinclude the possibilities of “A” or “B” or “A and B.”

With respect to the appended claims, those skilled in the art willappreciate that recited operations therein may generally be performed inany order. Examples of such alternate orderings may include overlapping,interleaved, interrupted, reordered, incremental, preparatory,supplemental, simultaneous, reverse, or other variant orderings, unlesscontext dictates otherwise. With respect to context, even terms like“responsive to,” “related to,” or other past-tense adjectives aregenerally not intended to exclude such variants, unless context dictatesotherwise.

While various aspects and embodiments have been disclosed herein, otheraspects and embodiments will be apparent to those skilled in the art.The various aspects and embodiments disclosed herein are for purposes ofillustration and are not intended to be limiting, with the true scopeand spirit being indicated by the following claims.

What is claimed is:
 1. A method comprising: creating multiple emulationenvironments including at least a virtual environment and a physicalenvironment; selecting an emulation environment from the multipleemulation environments in response to an identified event category;obtaining a resource authorization dependent upon apparent compliancewith a policy of causing the selected emulation environment to isolate afirst software object type from a second software object type; signalinga decision comprising one or more instances of an identifier, thedecision configured to signal whether to comply with the policy ofcausing the selected emulation environment to isolate the first softwareobject type from the second software object type; and receiving thedecision whether to comply with the policy of causing the selectedemulation environment to isolate the first software object type form thesecond software object type, wherein the receiving the decision isindicated by accepting a code implementing a conditional resourceauthorization, by taking no action, or by transmitting a device settingconfiguration indicating the policy compliance, and wherein at least oneof obtaining a resource authorization, signaling a decision, orreceiving the decision whether to comply is at least partiallyimplemented using one or more processing components.
 2. The method ofclaim 1 in which obtaining a resource authorization dependent uponapparent compliance with a policy of causing the selected emulationenvironment to isolate a first software object type from a secondsoftware object type comprises: configuring the resource authorizationat least in response to an indication of a potential defect in an objectof the second software object type.
 3. The method of claim 1 in whichobtaining a resource authorization dependent upon apparent compliancewith a policy of causing the emulation environment to isolate a firstsoftware object type from a second software object type comprises:configuring the resource authorization at least in response to anindication of a potential vulnerability in an object of the firstsoftware object type.
 4. The method of claim 1 in which signaling adecision comprising one or more instances of an identifier, the decisionconfigured to signal whether to comply with the policy of causing theselected emulation environment to isolate the first software object typefrom the second software object type comprises: transmitting a negativeresponse as the decision whether to comply with the policy of causingthe selected emulation environment to isolate the first software objecttype from the second software object type.
 5. The method of claim 1 inwhich obtaining a resource authorization dependent upon apparentcompliance with a policy of causing the selected emulation environmentto isolate a first software object type from a second software objecttype comprises: expressing and displaying on a user interface ahuman-readable explanation of the policy of causing the selectedemulation environment to isolate the first software object type from thesecond software object type.
 6. The method of claim 1 in which signalinga decision comprising one or more instances of an identifier, thedecision configured to signal whether to comply with the policy ofcausing the selected emulation environment to isolate the first softwareobject type from the second software object type comprises: seeking apattern in an instance of the first software object type.
 7. The methodof claim 1 in which signaling a decision comprising one or moreinstances of an identifier, the decision configured to signal whether tocomply with the policy of causing the selected emulation environment toisolate the first software object type from the second software objecttype comprises: hosting the second software object type in a portion ofthe selected emulation environment not directly addressable from atleast one instance of the first software object type.
 8. The method ofclaim 1 further comprising: causing another emulation environment toisolate a first instance of the first software object type from a secondinstance of the first software object type.
 9. A system comprising:circuitry for creating multiple emulation environments including atleast a virtual environment and a physical environment; circuitry forselecting an emulation environment from the multiple emulationenvironments in response to an identified event category; circuitry forobtaining a resource authorization dependent upon apparent compliancewith a policy of causing the selected emulation environment to isolate afirst software object type from a second software object type; circuitryfor signaling a decision comprising one or more instances of anidentifier, the decision configured to signal whether to comply with thepolicy of causing the selected emulation environment to isolate thefirst software object type from the second software object type; andcircuitry for receiving the decision whether to comply with the policyof causing the selected emulation environment to isolate the firstsoftware object type form the second software object type, wherein thereceiving the decision is indicated by accepting a code implementing aconditional resource authorization, by taking no action, or bytransmitting a device setting configuration indicating the policycompliance.
 10. The system of claim 9 in which the circuitry forobtaining a resource authorization dependent upon apparent compliancewith a policy of causing the selected emulation environment to isolate afirst software object type from a second software object type comprises:circuitry for executing an instance of the second software object typenatively.
 11. The system of claim 9 in which the circuitry for obtaininga resource authorization dependent upon apparent compliance with apolicy of causing the selected emulation environment to isolate a firstsoftware object type from a second software object type comprises:circuitry for receiving the resource authorization from an externalsource.
 12. The system of claim 9 in which the circuitry for signaling adecision comprising one or more instances of an identifier, the decisionconfigured to signal whether to comply with the policy of causing theselected emulation environment to isolate the first software object typefrom the second software object type comprises: circuitry for evaluatingwhether the first software object type is apparently isolated from thesecond software object type.
 13. The system of claim 9 in which thecircuitry for signaling a decision comprising one or more instances ofan identifier, the decision configured to signal whether to comply withthe policy of causing the selected emulation environment to isolate thefirst software object type from the second software object typecomprises: circuitry for causing the second software object type toinclude at least a third software object type and a fourth softwareobject type, the circuitry implemented using a syntactic joiningexpression.
 14. The system of claim 9 in which the circuitry forobtaining a resource authorization dependent upon apparent compliancewith a policy of causing the selected emulation environment to isolate afirst software object type from a second software object type comprises:circuitry for implementing the policy in logic for causing anapplication to be hosted in a composite environment containing theselected emulation environment hosting at least one instance of thefirst software object type.
 15. The system of claim 9 in which thecircuitry for obtaining a resource authorization dependent upon apparentcompliance with a policy of causing the selected emulation environmentto isolate a first software object type from a second software objecttype comprises: circuitry for recognizing a version of the firstsoftware object type or the second software object type.
 16. The systemof claim 9 in which the circuitry for signaling a decision comprisingone or more instances of an identifier, the decision configured tosignal whether to comply with the policy of causing the selectedemulation environment to isolate the first software object type from thesecond software object type comprises: circuitry for evaluating anoption of complying with the policy of causing the selected emulationenvironment to isolate the first software object type from the secondsoftware object type, wherein the evaluating is performed utilizing amodel logic, the model logic generating one or more valuationsarithmetically or logically distilled by a cost evaluation logic. 17.The system of claim 9 in which the circuitry for signaling a decisioncomprising one or more instances of an identifier, the decisionconfigured to signal whether to comply with the policy of causing theselected emulation environment to isolate the first software object typefrom the second software object type comprises: circuitry for causingthe selected emulation environment to contain at least a portion of thefirst software object type and to exclude the second software objecttype.
 18. The system of claim 9 in which the circuitry for signaling adecision comprising one or more instances of an identifier, the decisionconfigured to signal whether to comply with the policy of causing theselected emulation environment to isolate the first software object typefrom the second software object type comprises: circuitry for hosting atleast one instance of the first software object type in an address spacenot directly addressable from the selected emulation environment. 19.The system of claim 9 further comprising: circuitry for isolating aresource in response to an indication of a native execution of aninstance of the second software object type.
 20. The system of claim 9further comprising: circuitry for determining whether an instructionsequence of the first software object type is identical to anotherinstruction sequence.
 21. A system comprising: means for creatingmultiple emulation environments including at least a virtual environmentand a physical environment; means for selecting an emulation environmentfrom the multiple emulation environments in response to an identifiedevent category; means for obtaining a resource authorization dependentupon apparent compliance with a policy of causing the selected emulationenvironment to isolate a first software object type from a secondsoftware object type; means for signaling a decision comprising one ormore instances of an identifier, the decision configured to signalwhether to comply with the policy of causing the selected emulationenvironment to isolate the first software object type from the secondsoftware object type; and means for receiving the decision whether tocomply with the policy of causing the selected emulation environment toisolate the first software object type form the second software objecttype, wherein the means for receiving the decision are indicated byaccepting a code implementing a conditional resource authorization, bytaking no action, or by transmitting a device setting configurationindicating the policy compliance.
 22. The system of claim 21 in whichthe means for obtaining a resource authorization dependent upon apparentcompliance with a policy of causing the selected emulation environmentto isolate a first software object type from a second software objecttype comprises: means for configuring the resource authorization atleast in response to an indication of a potential defect in an object ofthe second software object type.
 23. The system of claim 21 in which themeans for obtaining a resource authorization dependent upon apparentcompliance with a policy of causing the selected emulation environmentto isolate a first software object type from a second software objecttype comprises: means for executing an instance of the second softwareobject type natively.
 24. The system of claim 21 in which the means forobtaining a resource authorization dependent upon apparent compliancewith a policy of causing the selected emulation environment to isolate afirst software object type from a second software object type comprises:means for configuring the resource authorization at least in response toan indication of a potential vulnerability in an object of the firstsoftware object type.
 25. The system of claim 21 in which the means forobtaining a resource authorization dependent upon apparent compliancewith a policy of causing the selected emulation environment to isolate afirst software object type from a second software object type comprises:means for receiving the resource authorization from an external source.26. The system of claim 21 in which the means for signaling a decisioncomprising one or more instances of an identifier, the decisionconfigured to signal whether to comply with the policy of causing theselected emulation environment to isolate the first software object typefrom the second software object type comprises: means for transmitting anegative response as the decision whether to comply with the policy ofcausing the selected emulation environment to isolate the first softwareobject type from the second software object type.
 27. The system ofclaim 21 in which the means for signaling a decision comprising one ormore instances of an identifier, the decision configured to signalwhether to comply with the policy of causing the selected emulationenvironment to isolate the first software object type from the secondsoftware object type comprises: means for evaluating whether the firstsoftware object type is apparently isolated from the second softwareobject type.
 28. The system of claim 21 in which the means for signalinga decision comprising one or more instances of an identifier, thedecision configured to signal whether to comply with the policy ofcausing the selected emulation environment to isolate the first softwareobject type from the second software object type comprises: means forcausing the second software object type to include at least a thirdsoftware object type and a fourth software object type.
 29. The systemof claim 21 in which the means for obtaining a resource authorizationdependent upon apparent compliance with a policy of causing the selectedemulation environment to isolate a first software object type from asecond software object type comprises: means for implementing the policyin logic for causing an application to be hosted in a compositeenvironment containing the selected emulation environment hosting atleast one instance of the first software object type.
 30. The system ofclaim 21 in which the means for obtaining a resource authorizationdependent upon apparent compliance with a policy of causing the selectedemulation environment to isolate a first software object type from asecond software object type comprises: means for expressing ahuman-readable explanation of the policy of causing the selectedemulation environment to isolate the first software object type from thesecond software object type.
 31. The system of claim 21 in which themeans for obtaining a resource authorization dependent upon apparentcompliance with a policy of causing the selected emulation environmentto isolate a first software object type from a second software objecttype comprises: means for recognizing a version of the first softwareobject type or the second software object type.
 32. The system of claim21 in which the means for signaling a decision comprising one or moreinstances of an identifier, the decision configured to signal whether tocomply with the policy of causing the selected emulation environment toisolate the first software object type from the second software objecttype comprises: means for evaluating an option of complying with thepolicy of causing the selected emulation environment to isolate thefirst software object type from the second software object type.
 33. Thesystem of claim 21 in which the means for signaling a decisioncomprising one or more instances of an identifier, the decisionconfigured to signal whether to comply with the policy of causing theselected emulation environment to isolate the first software object typefrom the second software object type comprises: means for seeking apattern in an instance of the first software object type.
 34. The systemof claim 21 in which the means for signaling a decision comprising oneor more instances of an identifier, the decision configured to signalwhether to comply with the policy of causing the selected emulationenvironment to isolate the first software object type from the secondsoftware object type comprises: means for causing the selected emulationenvironment to contain at least a portion of the first software objecttype and to exclude the second software object type.
 35. The system ofclaim 21 in which the means for signaling a decision comprising one ormore instances of an identifier, the decision configured to signalwhether to comply with the policy of causing the selected emulationenvironment to isolate the first software object type from the secondsoftware object type comprises: means for hosting at least one instanceof the first software object type in an address space not directlyaddressable from the selected emulation environment.
 36. The system ofclaim 21 in which the means for signaling a decision comprising one ormore instances of an identifier, the decision configured to signalwhether to comply with the policy of causing the selected emulationenvironment to isolate the first software object type from the secondsoftware object type comprises: means for hosting the second softwareobject type in a portion of the selected emulation environment notdirectly addressable from at least one instance of the first softwareobject type.
 37. The system of claim 21 further comprising: means forisolating a resource in response to an indication of a native executionof an instance of the second software object type.
 38. The system ofclaim 21 further comprising: means for causing another emulationenvironment to isolate a first instance of the first software objecttype from a second instance of the first software object type.
 39. Thesystem of claim 21 further comprising: means for determining whether aninstruction sequence of the first software object type is identical toanother instruction sequence.
 40. A method comprising: creating multipleemulation environments including at least a virtual environment and aphysical environment; selecting an emulation environment from themultiple emulation environments in response to an identified eventcategory; obtaining a resource authorization dependent upon apparentcompliance with a policy of causing the selected emulation environmentto isolate a first software object type from a second software objecttype; and signaling a decision whether to comply with the policy ofcausing the selected emulation environment to isolate the first softwareobject type from the second software object type, the signaling thedecision comprising seeking one or more instances of a provideridentifier or version identifier to identify a sequence of instructionsas being of the first software object type, and wherein at least one ofobtaining a resource authorization or signaling a decision whether tocomply is at least partially implemented using one or more processingcomponents.