Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

151 results about "Function pointer" patented technology

A function pointer, also called a subroutine pointer or procedure pointer, is a pointer that points to a function. As opposed to referencing a data value, a function pointer points to executable code within memory. Dereferencing the function pointer yields the referenced function, which can be invoked and passed arguments just as in a normal function call. Such an invocation is also known as an "indirect" call, because the function is being invoked indirectly through a variable instead of directly through a fixed identifier or address.

Method for dynamic linking function library sharing static linking function library with primary application

A kind of method of the dynamic chain joint function library sharing the static chain joint function with the main application program and the main application program chains a static chain function library and then establish a function pointer variable and a variable pointer variable of the static chain function library by the dynamic chain joint function library; and then transfer the function section calling from the static chain function library in the dynamic chain joint function library program code into the function pointer variable; then transfer the variable section calling from the static chain function library in the dynamic chain joint function library program code into the variable pointer variable; at last compile the main application program and the dynamic chain joint program code to the function library individually among them the related function of dynamic chain joint function library and the variable has been replaced by the way of pointer and then load the dynamic chain joint function library in the main application program at the same time deliver the storage location of function and variable to the dynamic chain joint function library which makes the function and variable section called to the static chain joint function library form the dynamic chain joint function library could share the static chain joint function library connected by the main application program.
Owner:SUNPLUS TECH CO LTD

Method for mobile phone to be compatible to different display part

The utility model relates to a method that a mobile phone is compatible with different display devices, which comprises the following steps: Step 1. a standard series number list is compiled for a LCD device; Step 2. relevant driving motions of LCD are defined to be a uniform dynamic function pointer; Step 3. a space is cultivated inside the flash disk of the mobile phone to store condition codes; Step 4. a condition code is written into the fixed storage space inside the flash disk of the mobile phone; Step 5. after the mobile is equipped with batteries and switched on, a condition code is released from the fixed location inside the flash disk that is cultivated in Step 3; by matching with the standard series number list, a corresponding LCD device driving function can be found and the function pointer points to the corresponding driving function; Step 6. the LCD device is initialized by the driving function and displaying of the LCD device is controlled properly by operation of the driving core of the LCD device. The utility model has the advantages that the method can download fixed program into the mobile phones, which improves efficiency of development and production for mobile phones largely and saves cost as well as time.
Owner:WINGTECH COMM

Covering film intelligent card with extended functions

The invention provides a covering film intelligent card with extended functions, and relates to the technical field of an intelligent card. The covering film intelligent card comprises a read-only memory, a random access memory and a nonvolatile erasable memory. An operating system of the read-only memory comprises a main process, an application command processing unit and a performance function unit. The random access memory comprises variable data. The nonvolatile erasable memory comprises modifiable user data. Structural characteristics of the covering film intelligent card are that the nonvolatile erasable memory also comprises a performance function pointer table, an application command function pointer table, a patch function unit, an additionally arranged command function pointer table and an additionally arranged application command function unit. The operating system of the read-only memory acquires a function pointer via inquiring the performance function pointer table, the application command function pointer table and the additionally arranged command function pointer table, and a function is scheduled in a function pointer mode so that functions of the intelligent card are realized. The covering film intelligent card can be applied to function restoration and expansion of new functions of the intelligent card after film covering so that the covering film intelligent card has characteristics of being simple in structure, small in space occupation and high in execution speed.
Owner:北京紫光青藤微系统有限公司

Method and device for acquiring webpage address

The invention discloses a method and device for acquiring a webpage address. The method comprises the following steps of: initializing a browser embedded insert preliminarily embedded in a browser, and registering a callback function pointer of the browser embedded insert in the browser in the process of initializing the browser embedded insert; when the browser triggers an operation event corresponding to an opened webpage every time, writing a webpage address quoted or skipped by the operation event into a corresponding parameter of a callback function through calling the callback function pointed by the callback function pointer by the browser, and analyzing the callback function through the browser embedded insert and recording an analysis result until the analysis result meets a preset ending condition, wherein the analysis result comprises the webpage address triggered every time and quoted or skipped by the operation event corresponding to the opened webpage and a recursion call relationship among webpage addresses recorded many times. By using the method and device for acquiring the webpage address in the invention, the cost for acquiring the webpage address is reduced, and the efficiency of acquiring the webpage address is increased.
Owner:北龙中网(北京)科技有限责任公司

Security defense method and device of Android privilege escalation attack based on integrity verification

The invention relates to a security defense method and device of the Android privilege escalation attacks based on integrity verifications. The method comprises the steps that the case that whether or not an application program is executing the system calls associated with sensitive kernel functions is detected in real time; integrity verifications are conducted on the sensitive kernel functions to be executed by the system calls; the accuracy and reliability of the kernel function pointer corresponding to the sensitive kernel functions are examined; the case that whether or not the internal storage pointed by the kernel function pointers has the commands for the privilege escalation attack features is evaluated; the detected application privilege escalation attacks are given warnings and blocked. According to the security defense method and device of the Android privilege escalation attacks based on integrity verifications, the privilege escalation attack behaviors of malicious programs are detected in real time and are given warnings and blocked, and the damages caused by attacks on the Android system are prevented, and the securities of the application and data are effectively protected. The security defense method and device of the Android privilege escalation attacks based on integrity verifications reduce security threats brought to the Android system by the privilege escalation vulnerabilities, and enhance the security of the Android system.
Owner:INST OF INFORMATION ENG CAS

ORACLE-based umbrella data import/export method

An ORACLE based umbrella data import / export method is characterized in that when data are imported, a main process (program) reads the external data into a memory in batch in the form of memory arrays, an encapsulated OCI data exchange interface is called to resolve the memory arrays in batch, and the resolved memory arrays are imported into a temporary table special for transactions; after the external data are imported into the temporary table, the umbrella imported API based on the temporary table uses the user-defined ORACLE function or process as the parameter to be executed by calling the umbrella imported API, the external data are dispersed in a plurality of user-defined physical tables, and the user-defined ORACLE function or process defines the dispersion of the data in the temporary table; the internal data are exported in batch: when the data are exported, the encapsulated OCI data exchange interface is called to read the internal data into the memory in the form of memoryarrays, and the memory arrays are exported in batch; and after the internal data are exported into the memory arrays, the umbrella exported API based on the multi-dimensional memory chip uses the user-defined ORACLE function pointer as the parameter to be executed by calling the umbrella exported API, and the internal data are exported into a plurality of files in a disperse manner.
Owner:LINKAGE SYST INTEGRATION

The Static function call graph construction method suitable for virtual function and function pointermethod is suitable for constructing static function call graph of virtual function and function pointer

The invention discloses a static function call graph construction method suitable for a virtual function and a function pointer. The static function call graph construction method comprises the following steps: 1, obtaining an intermediate code of a source program; 2, obtaining key information in the intermediate code, wherein the key information comprises a basic block sequence queue and virtualfunction related information; 3, performing simulation execution on the intermediate code based on the key information, analyzing an actual function called by a function calling instruction in the intermediate code, and recording a function calling relation; and 4, constructing a static function call graph according to the function call relationship. According to the method, the virtual function,the function pointer calling and the thread creation relationship can be comprehensively analyzed, and the complex function pointer calling can be accurately analyzed, so that program developers can be better helped to understand programs, and meanwhile, the accuracy of a static analysis method depending on a function calling graph is improved.
Owner:UNIV OF SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products