摘要:
Systems and methods for recovering from software processing errors are provided. The systems and methods provide for the validation of data following the occurrence of a software processing error.
摘要:
A reverse patch for undoing a forward patch for obtaining a new binary image from an old binary image is generated in two parts. First a reverse index file is generated when the forward patch is created at a host or server. The reverse index file identifies regions of similarity between the old binary image and the new binary image. The reverse index file is transmitted with the forward patch to an electronic device. Second, while applying the forward patch to obtain the new binary image from the old binary image, the electronic device generates the reverse patch based upon the new binary image, the old binary image, and the reverse index file. The forward patch and reverse patch may both be incremental patches. Incremental patches are generated and applied on a sector-by-sector basis.
摘要:
An incremental patch is generated as a set of delta files or sector-specific patches, intended to be applied incrementally to an old binary image. Each sector-sized patch takes into account changes to the binary image made by previous patches in the series, such that cyclic dependencies are eliminated. The sector-sized patches are generated by applying a binary difference algorithm to the then-current partially patched image, until each sector has a corresponding delta file. The order for patching sectors may be determined by selecting sectors for patching based on first overwriting those sectors making the least contribution of data to generation of the new binary image.
摘要:
Systems and methods for operating upon a mobile communications device. A system and method can be used with data operations with respect to the mobile communications device's memory, wherein the memory has sectors. Data structures are used with the data operations to determine whether a sector contains valid data or to locate a record's pointer in the memory. The data structures can be used for such operations as record creation, record movement, recovery, etc.
摘要:
A reverse patch for undoing a forward patch for obtaining a new binary image from an old binary image is generated in two parts. First a reverse index file is generated when the forward patch is created at a host or server. The reverse index file identifies regions of similarity between the old binary image and the new binary image. The reverse index file is transmitted with the forward patch to an electronic device. Second, while applying the forward patch to obtain the new binary image from the old binary image, the electronic device generates the reverse patch based upon the new binary image, the old binary image, and the reverse index file. The forward patch and reverse patch may both be incremental patches. Incremental patches are generated and applied on a sector-by-sector basis.
摘要:
A system and method of pre-linking classes for use by one or more applications. The system and method may also be used where the runtime processing is split between a host system and a target system. At the host system at least several classes are loaded and linked. At least one host-linked module is generated from the linked classes. The host-linked module is made available for use by the one or more applications operating on the target system.
摘要:
Systems and methods for providing symbolic information about fields, methods, and/or classes for a target device. A system and method may be used where the runtime processing is split between a host system and a target system. At the target device a test program uses a symbol not defined on the target device. A query is sent from the target device to a symbolic information source. The symbolic information source then provides the target device with information about the undefined symbol. The target device uses the information from the symbolic information source to complete the test program.
摘要:
A method and system for performing garbage collection involving sensitive information on a mobile device. Secure information is received at a mobile device over a wireless network. The sensitive information is extracted from the secure information. A software program operating on the mobile device uses an object to access the sensitive information. Secure garbage collection is performed upon the object after the object becomes unreachable.
摘要:
Scripting Language based applications can be limited in their ability to supply and execute sophisticated logic and complex processing. More traditional programming languages contain explicit function and/or procedure calls to implement more complex functionality, however, these languages use more complicated syntax and traditionally require mosophisticated programming knowledge to use. There are provided systems and methods for extending the capabilities of an application program for execution by a terminal. The application includes a script based workflow and non-executable content. One such method comprises loading the workflow for interpretation by a script interpreter, such that the workflow is configured for having a plurality of executable elements. This method also provides a global symbol structure for reference by the executable elements, the global symbol structure including addressing for coupling selected ones of the executable elements to corresponding external components. The external components are provided by a native runtime environment of the terminal for performing the action specified by the selected executable elements. This method also executes the executable elements in sequence such that execution of the selected ones of the execution elements are redirected to the respective external components through the corresponding global symbols of the global symbol structure. Predefined knowledge of the contents of the global symbol structure is shared by the runtime environment and the workflow of the application.
摘要:
A method and system for performing garbage collection involving sensitive information on a mobile device. Secure information is received at a mobile device over a wireless network. The sensitive information is extracted from the secure information. A software program operating on the mobile device uses an object to access the sensitive information. Secure garbage collection is performed upon the object after the object becomes unreachable.