Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

88 results about "C programming language" patented technology

Android application reinforcing method baed on C source code mixing

The invention discloses an Android application reinforcing method based on C source code mixing. The method comprises writing program key codes by using C programming languages and mixing C source codes. The reinforcement of Android application is achieved by mixing the C source codes in the Android application program, and the Android application program codes are protected. The Android application reinforcing method based on C source code mixing specifically includes the steps of writing the key part of the program by using C programming languages, writing programs into .so dynamic-link library file, invoking the dynamic-link library by using JNI technology in Java language, and then mixing the C source codes, so as to achieve the reinforcement of Android application. According to the Android application reinforcing method based on C source code mixing, important codes are saved in the C dynamic-link library by adopting NDK programming, and then the C source codes are mixed, the software protection is improved. At the same time, the important codes are written in a so library, the reusability of the codes are increased, ready-made so library can be directly introduced into other applications, so as to eliminate the troubles of secondary development.
Owner:北京鼎源科技有限公司

Automatic code generation method from AADL to C language

The invention relates to an automatic code generation method from AADL to C language. The method comprises the following steps that 1, a transformational rule from an AADL meta model to the C language is defined according to the semantic meaning of the AADL meta model, the semantic meaning of an object run environment and the grammar semantic meaning of the C language; 2, an automatic code generation template is made according to the adopted meta model capable of being obtained by an AADL model, the semantic meaning of the meta model and the transformational rule from the AADL meta model to the C language; 3, a template transformation engine is compiled according to the automatic code generation template; 4, after the AADL model is input, the input AADL model is automatically analyzed, and information of the AADL meta model is extracted, and is generated into C language codes through the template transformation template according to the automatic code generation template. The method has the following advantages that the transformational rule from the AADL meta model to the C language is defined, and semantic mapping of the AADL and the C language is effectively achieved; the code transformation efficiency is improved through the template engine.
Owner:北京神舟航天软件技术股份有限公司

Method and system for analyzing block cipher algorithm

The invention discloses a method and system for analyzing a block cipher algorithm. The method comprises the following steps of: firstly, defining a high-level descriptive language; secondly, making a user describe the block cipher algorithm as the combination of a plurality of block cipher algorithm basic components according to the high-level descriptive language; thirdly, resolving the block cipher algorithm basic components into C language codes which can be identified by a computer, and compiling and linking the C language codes to generate executable block cipher algorithm components to be tested; and lastly, configuring a testing plan according to an operation request of the user, selecting a needed block cipher algorithm component to be tested, and testing and analyzing the selected block cipher algorithm component to be tested according to the testing plan to obtain an analysis result. Due to the adoption of the method and system for analyzing the block cipher algorithm, the security analysis of a block cipher is converted into the security analysis of the executable block cipher algorithm components to be tested, which can be identified by the computer, so that uniform analysis of the security of most conventional block cipher algorithms can be realized.
Owner:THE PLA INFORMATION ENG UNIV

One-key reset method suitable for embedded Linux operating system

InactiveCN102520778ASolve the problem of needing to connect the upper computer to restore the systemHigh degree of intelligenceData resettingRedundant operation error correctionMicrocontrollerOperational system
A one-key reset method suitable for an embedded Linux operating system belongs to the technical field of an embedded system. The one-key reset method of the embedded operating system is constructed by C programming language and assembly language. A user starts the one-key reset of the system by a one-key reset button, and an operating system to be reset is stored in a common SD (Secure Digital) card. When the reset button is pressed, a main processor is triggered to start the level switching of a control module, and the starting mode of the main processor is changed to be in a one-key reset mode. When the reset is finished, a main processor module sends a signal to a reset module, the starting mode is changed to be a normal starting mode, the main processor module is reset, and the system is in login. The system adopts a modular design, a peripheral singlechip is additionally arranged and is taken as a coprocessor module to control the reset of the main processor and change the starting mode of the main processor. By the communication between a GPIO (General Purpose Input / Output) port and the main processor, the one-key reset method is suitable for the embedded main processors with different structures and solves the problem that a common embedded system needs to be connected with an upper computer to be reset.
Owner:SHANDONG UNIV

Video key frame extraction algorithm

The invention discloses a video key frame extraction algorithm, and belongs to the technical field of information security. According to the algorithm, firstly the black border width of the horizontaldirection and the black border height of the vertical direction of a certain frame in the current input video stream and the width and height of the effective image area of the frame are calculated;then the feature information of the effective image area of the frame is calculated and compared with that of the last frame so as to calculate the degree of difference; when the degree of differenceis greater than the threshold, the data in the difference frame are compared with each frame of data of a cache area so as to calculate the similarity of the frame; and when the similarity of the difference frame is greater than the threshold, the difference frame is regarded to be similar to the certain frame in the cache area, one non-difference frame is added, the maximum cumulative number of the non-difference frame is reached, the frame is outputted as the difference frame and written in the cache area, statistics of the variance value of the Y value and the variance value of the UY valueof the frame is performed and the key frame and the blank frame are outputted. The algorithm is realized by the C programming language and can be applied to multi-video and multi-thread calling so that the algorithm is high in adaptability and efficient and rapid.
Owner:BEIJING SCISTOR TECH +1

Dual-chaotic system dynamic key and RSA jointed streaming media secret communication method

A dual-chaotic system dynamic key and RSA jointed streaming media secret communication method relates to the technical field of communication encryption and solve the problem of certain potential safety hazards and poor secrecy of streaming media communication due to the fact that the root key is not effectively protected in the network transmission process of streaming media communication. Chaotic system parameters, iterative step length generated in a chaotic sequence and the preset iteration times serve as dynamic parameters, values meeting the conditions are generated randomly before each communication and form the root key, and the root key is subject to secrecy synchronization through the RSA algorithm. Difference of root keys makes the chaotic key sequences used for each encryption and deception are different. Meanwhile, the chaotic key sequences are formed by interweaving combination of two hyper-chaotic sequences so the chaotic key sequences are more complicated. The dual-chaotic system dynamic key and RSA jointed streaming media secret communication method reduces the generating time of the chaotic key sequences and improves the encryption speed. Testing of software written through C programming language in the local area network proves that the dual-chaotic system dynamic key and RSA jointed streaming media secret communication method can meet requirements of streaming media communication for safety and timeliness.
Owner:HARBIN UNIV OF SCI & TECH

Embedded multimedia playing system and method

The embodiment of the invention discloses an embedded multimedia playing system. The embedded multimedia playing system comprises a foreground interface, a middleware and a background control module, wherein the foreground interface is a graphical user interface based on hypertext markup language (HTML), cascading style sheet (CSS) and JavaScript language; the middleware is based on Qt/Embedded, is used for providing an interface and supporting display output, and is connected with the background control module; the background control module adopts standard C language; and a user inputs information from the graphical user interface, the middleware receives the information input by the user through the interface, and the background control module processes the input information, does corresponding operation and invokes a drive to perform decoding play. The Qt/Embedded serves as the middleware, the graphical user interface and the background control module are separated from the Qt/Embedded frame, the interface for accessing mutually is provided, and background control is realized by using the C language, so the coupling degree of the foreground module and the background module is reduced, the fault tolerance and the stability of the system are improved, and the using efficiency of resources is improved. The invention also discloses an embedded multimedia playing method with high fault tolerance and stability.
Owner:SUN YAT SEN UNIV

Instrumentation and dynamic test coverage information extraction method of C-language embedded software

The invention discloses an instrumentation and dynamic test coverage information extraction method of C-language embedded software. The method comprises the following steps of: regarding a C-language program as an array which is formed by all branch points, wherein each branch point corresponds to an element in the array; defining each element to be in two states, wherein 1 represents that the branch points are executed, and 0 represents that the branch points are unexecuted; defining the array in a special storage area; at each branch point of the C-language program, adding an operation code into a branch point information array which is defined in the special storage area, wherein the operation code is used for outputting information which indicates whether the branch points are executed; executing the C-language program into which the operation code is added, and then extracting the branch point information array from the special storage area; and according to the state of each element in the branch point information array, determining the execution situation of each branch point in the C-language program, and thus obtaining the dynamic test coverage of the C-language program. The instrumentation and dynamic test coverage information extraction method of the C-language embedded software has the characteristics of low code expansion rate, small storage space of branch point information, and convenience for extraction of coverage information.
Owner:BEIJING INST OF CONTROL ENG

Analysis method and monitoring method for C language simulation model

ActiveCN102629213AApplicable analysisApplicable monitoring requirementsProgram controlMemory systemsLexical analysisC programming language
The invention provides an analysis method for a C language simulation model. A C code analysis method category is generated by grammar files in advance, wherein the C code analysis method category comprises a syntax analysis module, a lexical analysis module and a syntax tree generation module. The method includes the steps that the lexical analysis module in the C code analysis method category is called to analyze lexical content of the imported C language simulation model, so as to form a token flow; the syntax analysis module is called to analyze the syntax content of the imported C language simulation model according to the token flow; the syntax tree generation module is called to generate a corresponding syntax tree according to the syntax content obtained through analysis; and information is extracted from the syntax tree and stored in a model information file. The invention further provides a monitoring method of the C language simulation model. The monitoring method comprises the analysis method. The analysis method and the monitoring method provided by the invention fill in the present blanks in the C language simulation model analysis and monitoring technology in china, and the implementation processes of the analysis method and the monitoring method are simple.
Owner:BEIJING RUNKE GENERAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products