WO2003038610A1 - Installation de programme compile notamment dans une carte a puce - Google Patents
Installation de programme compile notamment dans une carte a puce Download PDFInfo
- Publication number
- WO2003038610A1 WO2003038610A1 PCT/FR2002/003599 FR0203599W WO03038610A1 WO 2003038610 A1 WO2003038610 A1 WO 2003038610A1 FR 0203599 W FR0203599 W FR 0203599W WO 03038610 A1 WO03038610 A1 WO 03038610A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- compiled program
- program
- compiled
- pgc
- processing device
- Prior art date
Links
- 238000009434 installation Methods 0.000 title claims abstract description 23
- 238000012545 processing Methods 0.000 claims abstract description 37
- 101100438168 Arabidopsis thaliana CAD9 gene Proteins 0.000 claims abstract description 31
- 101100494469 Dictyostelium discoideum cadA gene Proteins 0.000 claims abstract description 31
- 101100178218 Schizosaccharomyces pombe (strain 972 / ATCC 24843) hmt2 gene Proteins 0.000 claims abstract description 31
- 101150018983 cad1 gene Proteins 0.000 claims abstract description 31
- 239000013256 coordination polymer Substances 0.000 claims description 31
- 238000000034 method Methods 0.000 claims description 18
- 230000008569 process Effects 0.000 claims description 6
- 101100326580 Arabidopsis thaliana CAD4 gene Proteins 0.000 abstract description 25
- 101100123053 Arabidopsis thaliana GSH1 gene Proteins 0.000 abstract description 25
- 101150081304 CAD2 gene Proteins 0.000 abstract description 25
- 101150096994 Cdx1 gene Proteins 0.000 abstract description 25
- 101100381325 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) PCA1 gene Proteins 0.000 abstract description 25
- 238000012795 verification Methods 0.000 description 24
- 230000015654 memory Effects 0.000 description 21
- 238000007781 pre-processing Methods 0.000 description 6
- 230000008859 change Effects 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000011900 installation process Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000010422 painting Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
Definitions
- the present invention relates to the installation of a program compiled in intermediate language, such as an application or a service library, which was originally written in a high level object oriented language and which must be downloaded and executed in a device. data processing with low memory and processing capacity.
- the data processing device is for example a portable electronic object such as a smart card.
- the invention relates to the process of verifying a compiled program loaded in the data processing device, during its installation therein.
- a code verifier in the data processing device verifies low-level security properties in a loaded compiled program in order to ensure that the loaded code cannot influence the security mechanisms of the included processing device especially in the interpreter and the memory management means.
- Verification mainly consists of analyzing the loaded code, comparing information contained in the compiled program and keeping some of it.
- integrating a code verifier into a processing device such as a smart card, whose resources are relatively limited, poses memory problems both in terms of memory size and of the time required to perform the verification operations.
- the compiled program can be modified outside the processing device while ensuring that the program has the same meaning but facilitates verification.
- the modification of the compiled program does not make it compatible with the processing devices which were able to receive it initially without change.
- the present invention aims to make the installation of a compiled program faster in a data processing device, without modifying the interpretation of the program.
- a method for installing a program made up of several components and compiled outside a data processing device to be executed in it is characterized in that it comprises the steps of: detecting outside the data processing device, predetermined installation information in the components of the compiled program,
- first and second additional components containing predetermined detected information respectively which are reformulated and necessary also for the installation of other programs in the data processing device and which are reformulated and are only necessary for the installation of said compiled program, load from outside the compiled program and the first and second components additional in the data processing device, and install the compiled program loaded in dependence on the predetermined information reformulated in the first and second additional components.
- the invention does not add information to the compiled program to be executed and is an effective solution for quickly accessing information necessary for the installation of the program thanks to an optimization in terms of access time and memory. the verification process of the compiled program.
- the method comprises the step of removing the second additional component in the data processing device before any execution of the compiled program.
- the information predetermined in the loaded compiled program cannot be stored in part.
- the method of the invention comprises recognition of the first and second additional components in the data processing device so as to store only the loaded compiled program and not to store the additional components if the latter are not not recognized by the data processing device, and to memorize the compiled program without the information predetermined detected but with the additional components if these are recognized by the data processing device.
- the predetermined information detected can relate to the format and to the typing of the compiled program
- the step of installing comprises a step of checking the format of the loaded compiled program and a step of checking the typing of the loaded compiled program depending on the predetermined information reformulated.
- FIG. 1 is a block diagram of a server and client system of the chip card type in a reception terminal, in which the main steps of the method for installing a program compiled according to the invention are shown.
- FIG. 1 there is conventionally a client / server system comprising software means for the implementation of the program installation method according to the invention.
- the client and the server are connected through a telecommunications network of internet RES type.
- the client is a data processing device with low memory and data processing capacity.
- the client is a portable electronic object of the CP chip card type, also known as a microcontroller card or with an integrated circuit, housed in a removable manner in a reader of a TE reception terminal.
- the smart card to which we will refer in the following as that example of a data processing device is of any known type of contact or contactless smart card, and may be a payment card, a telephone card, an additional card, a game card, etc.
- the electronic terminal TE can be a personal electronic computer PC, or a banking terminal, or a point of sale terminal.
- the terminal TE and the smart card CA can be a mobile cellular radiotelephone terminal and a removable telephone subscriber identity module SIM (Subscriber Identity Module).
- the data processing device can be a portable electronic object such as a personal digital assistant PDA (Personal Digital Assistant) or an electronic purse linked by modem to the telecommunications network RES.
- FIG. 1 relate to functions having a link with the invention and which can correspond to software and / or hardware modules installed respectively in the server SE and the smart card CP.
- FIG. 1 also shows steps for installing a program compiled according to the invention which are carried out respectively by functional blocks in the server and the smart card CP.
- the TE reception terminal is considered transparent to the installation process, that is to say does not intervene directly in the processing relating to the installation of a compiled program.
- the SE server as an electronic means external to the CP card, is for example the server from a website belonging to the publisher of the CP card, or else to the editor of a source program PG to download into the CP card.
- the source program PG to be loaded and executed in the smart card CP was initially written in a high level language of the object oriented type such as the Java language, or more particularly the Java Card language.
- the server SE comprises a compiler CM which converts the program PG in source language Java Card into a program compiled PGC in intermediate language, also called pseudocode, composed of instruction words formed by bytes, called bytecodes, which are ready to be executed by an IT interpreter constituting the Java Card virtual machine in the smart card CP.
- CM compiler CM which converts the program PG in source language Java Card into a program compiled PGC in intermediate language, also called pseudocode, composed of instruction words formed by bytes, called bytecodes, which are ready to be executed by an IT interpreter constituting the Java Card virtual machine in the smart card CP.
- the compiled program PGC is an application, that is to say a compiled file structured in several CO software components which may each correspond to an object class, or to several object classes grouped together. in a package, or at an interface.
- a component such as a class, comprises predetermined IP information which, according to the invention, is necessary for the installation of the program compiled in the smart card CP.
- the IP information contributes to the verification of the PGC compiled program during the loading and before any execution thereof in the smart card CP.
- IP information mainly concerns the format and typing of the PGC compiled program. Verification of the format essentially concerns the syntax and / or the structure of the compiled program, for example the correct lengths of the attributes of the fields, the correct format of the instructions, etc.
- the typing is relative to the semantics and syntax of the code in the components of the compiled program PGC so as to ensure the consistency (consistency) of the instructions inside a component and between the components of the compiled program and with components of other programs.
- the server SE includes a compiled program preprocessing module PT which essentially performs two steps of the method of the invention outside of the smart card CP : a detection step SI for detecting predetermined information IP relating to the format and typing in the components CO of the compiled program PGC, and a construction step S2 to construct two additional components CAD1 and CAD2.
- the preprocessing module PT detects predetermined information in the components CO of the compiled program PGC which are relating to the format and the typing of the program PGC and which will be used for the subsequent verification of the latter in the smart card CP.
- the detected information is not extracted from the CO components, but only copied to a predetermined memory location in the server in order to build the two additional components in the next step S2.
- the CO components in the PGC compiled program are not thus modified in the PT preprocessing module so that any smart card which receives the PGC compiled program and which is unable to recognize the additional components CAD1 and CAD2, can execute the compiled program not changed.
- the step of constructing additional components S2 mainly consists in reformulating the predetermined information IP detected in the CO components and in classifying them into two categories: the information necessary later for the verification of other programs and the information only necessary for the verification of this program compiled, the latter can be erased at least partially.
- the PT preprocessing module analyzes the predetermined information detected so as to reformulate it in order to access it more quickly during the installation of the compiled program and in order to reduce the size of the memory location occupied by the detected information IP, and more generally by the compiled PGC program. For example, the PT module removes redundancies in detected IP information; according to a particular example, when two labels identify two entries relating to two structures having the same content in a table relating for example to the constant_j? ool field, one of the two entries is deleted in step S2.
- the predetermined information reformulated IP is classified into two additional components CAD1 and CAD2 according to whether this information is used only or not for the installation of the compiled program PGC in the smart card CP.
- the first additional component CAD1 contains IP information which is exported, that is to say accessible to other programs.
- This first reformulated predetermined information must be kept in the chip card CP after the installation of the compiled program PGC.
- the first information for example relating to class fields, can be used to verify in particular other applications or packages or components, that is to say other compiled programs imported subsequently into the CP smart card, and must therefore be accessible for later verifications in the map.
- the reformulated predetermined information classified in the first additional component CAD1 is thus accessible to all the applications and therefore to all of the components thereof installed in the smart card CP thanks to their exported nature.
- second reformulated predetermined information classified in the second additional component CAD2 is information not exported in order to make them visible only inside the compiled program PGC in question and to make them inaccessible from another package or another program.
- the second reformulated predetermined information will only be used to install the compiled program PGC in the chip card CP, that is to say, to verify that of the program PGC, and will therefore not be kept in memory in the card after this installation so as to reduce the memory occupation by the PGC program, as will be seen below.
- the PT preprocessing module uses a known extension mechanism of the compiled program provided by the designer of the Java Card language.
- the step SI copies a specific component called “descriptor” DES which is included in the program PGC and which already contains information predetermined IP required for further verification.
- This variant relates to the context of the Java Card language for which the verification process must adapt to the execution context already existing in the chip card CP, that is to say the virtual machine IT in it cannot be changed.
- step S2 reformulates the predetermined information IP found in the descriptor DES and classifies them into two additional components CAD1 and CAD2 having the exported and non-exported characters respectively.
- the first additional component CAD1 contains predetermined information of format and typing which are obligatorily preserved to check other imported programs, and thus constitutes a descriptor component "export".
- the second additional component CAD2 includes predetermined format and typing information which are only used for the verification of the PGC compiled program, and which cannot be accessed by another compiled program, i.e. by another class or another package or interface not belonging to the PGC compiled program, and thus constitutes an "internal" descriptor component.
- a possibly secure charger CH assembles the compiled program PGC and the two additional components CAD1 and CAD2 for example in a web page which is downloaded into the smart card CP through the internet network RES and the terminal TE.
- the download of the PGC compiled program from the SE server is carried out transparently through a browser and an intermediate software module of plugin or proxy type TE terminal.
- a verifier VER included in the smart card CP performs other steps C1 to C5 of the method for installing a program compiled according to the invention.
- the smart card CP also includes an ED link editor and an IT interpreter constituting the Java Card virtual machine. All these software modules are installed in the non-rewritable ROM memory and the non-volatile EEPROM memory of the smart card.
- the verifier VER verifies the format and the typing of the downloaded compiled program PGC and the ED link editor ensures the links between the components CO of the downloaded program PGC with those of the applications already installed in the smart card CP.
- the IT interpreter is for example a virtual machine which interprets the standardized instructions of the compiled program PGC so that it is executed in native code by the microprocessor PR of the card.
- the VER verifier begins the verification of the compiled program loaded with PGC by examining the identifiers of the additional components CAD1 and CAD2 in the extension of the PGC program in step Cl. If the verifier does not recognize the additional components, the ROM and EEPROM memories of the smart card record the compiled program PGC with the predetermined unreformulated information IP or the descriptor DES without change, as specified by the format of the program, and do not record the additional components CAD1 and CAD2 which the smart card ignores, at a step C11. In this case, the smart card will subsequently execute the PGC program without change, in a known manner.
- the non-volatile memory of the smart card stores the compiled PGC program and only partially stores the predetermined detected non-reformulated IP information contained in the PGC program, or does not store the detected non-reformulated descriptor DES contained in the PGC program, and also stores the additional components CAD1 and CAD2 to the 'step C2.
- the verifier VER proceeds to two verification steps proper C3 and C4 using the predetermined information reformulated IP included in the additional components CAD1 and CAD2.
- Step C3 is a structural check to ensure that all the data in the PGC compiled program has a correct format for subsequent execution by the IT interpreter.
- Step C3 examines not only the format of the fields of the PGC compiled program but also the format of other characteristics such as names, attributes, labels, instructions as well as correct matches of these in paintings. These examinations are facilitated by easier and therefore faster access to IP information relating to the format which has been reformulated in the additional components CAD1 and CAD2. If one of the formats examined is incorrect in step C3, the verifier VER stops the verification in progress and erases the compiled program PGC and the additional components CAD1 and CAD2 in the memories of the card CP, in a step C34.
- the verifier VER checks in the next step C4 that the compiled program complies with the typing rules defined by the programming language, in this case the Java Card language.
- the typing verification is facilitated by the organization and reformulation of the predetermined IP information relating to the typing included in the components CAD1 and CAD2.
- the typing verification consists in particular of a semantic verification of the fields of the compiled program, a syntactic verification of the signature of fields and parameters, a verification of the consistency of each line of code supporting an instruction proper composed of an operation code and possibly of one or more operands, a check of references to the constant_pool field, the consistency of the instructions between the CO software components of the program, etc.
- the verifier VER stops the verification and erases the compiled program PGC and the additional components CAD1 and CAD2 in the memories of the card CP, in step C34.
- the verifier VER stops the verification and erases the compiled program PGC and the additional components CAD1 and CAD2 in the memories of the card CP, in step C34.
- the verifier VER stops the verification and erases the compiled program PGC and the additional components CAD1 and CAD2 in the memories of the card CP, in step C34.
- the verifier VER stops the verification and erases the compiled program PGC and the additional components CAD1 and CAD2 in the memories of the card CP, in step C34.
- the verifier VER stops the verification and erases the compiled program PGC and the additional components CAD1 and CAD2 in the memories of the card CP, in step C34.
- the verifier VER stops the verification and erases the compiled program PGC and the additional components CAD1 and CAD2 in the memories of the card
- the verifier deletes directly from the non-volatile memory of the chip card CP, the private predetermined information gathered in the second additional component CAD2. Removing the CAD2 component reduces the size of the memory location occupied by the PGC program and the first additional CAD1 component.
- the first component CAD1 is kept in memory since it contains predetermined public information which will be used later to verify in particular other compiled programs downloaded subsequently. Thanks to the preprocessing in the PT module of the SE server, the VER verifier does not need to search for information which would be scattered in the compiled program and which is useless for subsequent executions. No structural modification is necessary to keep the first additional CAD1 component, except that some data in it can be modified when editing links in the ED editor, but without imposing a change in the structure of the CAD1 component. The compiled program is then ready to be executed in the IT interpreter.
- steps C1 to C5 are represented in the VER verifier before the ED link editor, the loading, verification, link editing and interpretation can be performed on the fly, almost simultaneously as and measurement of the loading of the PGC compiled program in the CP card.
- a compression of the program compiled with the CAD1 and CAD2 components can be planned by preparing and executing it in a partial or total way in the SE server or the CP card or both.
- the invention is not limited to the preferred embodiment described above, but relates to any program initially expressed in an object-oriented source language and any data processing device other than a smart card which in particular has a memory capacity. and relatively low processing.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/491,916 US20050183081A1 (en) | 2001-10-31 | 2002-10-21 | Installation of a compiled program, particularly in a chip card |
EP02790528A EP1442370A1 (fr) | 2001-10-31 | 2002-10-21 | Installation de programme compile notamment dans une carte a puce |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR01/14187 | 2001-10-31 | ||
FR0114187A FR2831684B1 (fr) | 2001-10-31 | 2001-10-31 | Installation de programme compile notamment dans une carte a puce |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2003038610A1 true WO2003038610A1 (fr) | 2003-05-08 |
Family
ID=8869002
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR2002/003599 WO2003038610A1 (fr) | 2001-10-31 | 2002-10-21 | Installation de programme compile notamment dans une carte a puce |
Country Status (5)
Country | Link |
---|---|
US (1) | US20050183081A1 (fr) |
EP (1) | EP1442370A1 (fr) |
CN (1) | CN1582431A (fr) |
FR (1) | FR2831684B1 (fr) |
WO (1) | WO2003038610A1 (fr) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8423007B2 (en) * | 2004-03-19 | 2013-04-16 | Brightpoint, Inc. | Multi-phone programming application |
US9509824B2 (en) | 2004-03-19 | 2016-11-29 | Brightpoint, Inc. | Multi-phone programming application |
US8408459B1 (en) | 2005-01-14 | 2013-04-02 | Brightpoint, Inc. | 4PL system and method |
EP1934727B1 (fr) * | 2005-08-23 | 2019-01-16 | Red Bend Ltd. | Procede et systeme de mise a jour in situ de contenu stocke dans un dispositif de stockage |
CN101059759B (zh) * | 2006-04-21 | 2011-12-14 | 鸿富锦精密工业(深圳)有限公司 | 程序动态烧录的系统及方法 |
US20090192857A1 (en) * | 2008-01-25 | 2009-07-30 | Morse Richard A | Product Lifecycle Management Method and Apparatus |
DE102015119414A1 (de) * | 2015-11-11 | 2017-05-11 | Cideon Software Gmbh & Co. Kg | Verfahren zur Entwicklung einer Baugruppe, die mindestens eine mechatronische Komponente aufweist, und eine entsprechende Anordnung |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5734822A (en) * | 1995-12-29 | 1998-03-31 | Powertv, Inc. | Apparatus and method for preprocessing computer programs prior to transmission across a network |
WO1999049392A1 (fr) * | 1998-03-23 | 1999-09-30 | International Business Machines Corporation | Systeme d'execution java avec regroupement constant modifie |
WO2000046667A2 (fr) * | 1999-02-02 | 2000-08-10 | Sun Microsystems, Inc. | Edition de liens par jetons |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5765201A (en) * | 1995-07-31 | 1998-06-09 | International Business Machines Corporation | Changing page size in storage media of computer system |
US5809251A (en) * | 1996-10-09 | 1998-09-15 | Hewlett-Packard Company | Remote installation of software by a management information system into a remote computer |
US6023585A (en) * | 1997-05-02 | 2000-02-08 | Webtv Networks, Inc. | Automatically selecting and downloading device drivers from a server system to a client system that includes one or more devices |
US5970252A (en) * | 1997-08-12 | 1999-10-19 | International Business Machines Corporation | Method and apparatus for loading components in a component system |
US6195794B1 (en) * | 1997-08-12 | 2001-02-27 | International Business Machines Corporation | Method and apparatus for distributing templates in a component system |
US6166460A (en) * | 1999-01-22 | 2000-12-26 | Lear Automotive Dearborn, Inc. | Electrical junction box having a replaceable controller |
US6397385B1 (en) * | 1999-07-16 | 2002-05-28 | Excel Switching Corporation | Method and apparatus for in service software upgrade for expandable telecommunications system |
JP2004534973A (ja) * | 2000-04-14 | 2004-11-18 | ゴー アヘッド ソフトウェア インコーポレイテッド | ネットワークデバイスのアップグレードシステム及び方法 |
US7131122B1 (en) * | 2000-08-24 | 2006-10-31 | International Business Machines Corporation | Apparatus, system and method for detecting old version of an applet in a client brower's JVM |
US6918113B2 (en) * | 2000-11-06 | 2005-07-12 | Endeavors Technology, Inc. | Client installation and execution system for streamed applications |
US6938250B2 (en) * | 2002-06-12 | 2005-08-30 | Microsoft Corporation | Image-based software installation |
-
2001
- 2001-10-31 FR FR0114187A patent/FR2831684B1/fr not_active Expired - Fee Related
-
2002
- 2002-10-21 EP EP02790528A patent/EP1442370A1/fr not_active Withdrawn
- 2002-10-21 WO PCT/FR2002/003599 patent/WO2003038610A1/fr not_active Application Discontinuation
- 2002-10-21 CN CNA028218094A patent/CN1582431A/zh active Pending
- 2002-10-21 US US10/491,916 patent/US20050183081A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5734822A (en) * | 1995-12-29 | 1998-03-31 | Powertv, Inc. | Apparatus and method for preprocessing computer programs prior to transmission across a network |
WO1999049392A1 (fr) * | 1998-03-23 | 1999-09-30 | International Business Machines Corporation | Systeme d'execution java avec regroupement constant modifie |
WO2000046667A2 (fr) * | 1999-02-02 | 2000-08-10 | Sun Microsystems, Inc. | Edition de liens par jetons |
Non-Patent Citations (2)
Title |
---|
ANONYMOUS: "Java Card 2.1.1 Virtual Machine specification", SUN MICROSYSTEMS JAVA CARD SPECIFICATION 2.1.1, 18 May 2000 (2000-05-18), pages i - v,1-5,65-116, XP002208585 * |
LEROY X: "On-Card Bytecode Verification for Java Card", PROCEEDINGS OF E-SMART 2001, INTERNATIONAL CONFERENCE ON RESEARCH IN SMART CARDS - LECTURE NOTES IN COMPUTER SCIENCE, vol. 2140, 19 September 2001 (2001-09-19) - 21 September 2001 (2001-09-21), Cannes, France, pages 150 - 164, XP002208586, Retrieved from the Internet <URL:http://link.springer.de/link/service/series/0558/papers/2140/21400150.pdf> [retrieved on 20020802] * |
Also Published As
Publication number | Publication date |
---|---|
CN1582431A (zh) | 2005-02-16 |
FR2831684A1 (fr) | 2003-05-02 |
US20050183081A1 (en) | 2005-08-18 |
EP1442370A1 (fr) | 2004-08-04 |
FR2831684B1 (fr) | 2004-03-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8775487B2 (en) | Filesystem access for web applications and native code modules | |
EP1212678B1 (fr) | Protocole de gestion, procede de verification et de transformation d'un fragment de programme telecharge et systemes correspondants | |
US20020147735A1 (en) | Method and system for optimizing file loading in a data communication network | |
US8799928B1 (en) | System services for native code modules | |
US20060230234A1 (en) | Browser cache management | |
FR2809200A1 (fr) | Procede de securisation d'un langage du type a donnees typees, notamment dans un systeme embarque et systeme embarque de mise en oeuvre du procede | |
FR2824160A1 (fr) | Conteneur generique configurable de facon dynamique | |
WO2010009996A1 (fr) | Procede de compilation de programme informatique | |
US20070162510A1 (en) | Delayed file virtualization | |
EP1700218B1 (fr) | Procede de determination de caracteristiques operationnelles d'un programme | |
EP1442370A1 (fr) | Installation de programme compile notamment dans une carte a puce | |
EP1782191B1 (fr) | Procede de chargement d'un logiciel en langage intermediaire oriente objet dans un appareil portatif | |
WO2006000531A1 (fr) | Procede de gestion d'une carte a puce multi-applicative | |
WO2001002955A1 (fr) | Procede de verification de transformateurs de codes pour un systeme embarque, notamment sur une carte a puce | |
EP4123492A1 (fr) | Mise en partage d'une fonction d'une application définie en langage orienté objet | |
Markantonakis | The case for a secure multi-application smart card operating system | |
FR2826761A1 (fr) | Procede d'analyse d'un document represente dans un langage de balisage | |
EP1054332B1 (fr) | Système et procédé de gestion d'attributs dans un environnement orienté objet | |
Wang et al. | Research on intelligent reverse analysis technology of firmware of internet of things | |
EP4018313B1 (fr) | Récuperateur de données dans un dispositif électronique | |
FR3060166A1 (fr) | Procede d'acces a des donnees partagees dans une arborescence de fichiers geree par un systeme de fichiers mettant en oeuvre un mecanisme d'heritage | |
CN118094533A (zh) | 一种应用的风险识别方法和装置 | |
WO2024209100A1 (fr) | Procédé de génération d'un code informatique résistant aux attaques par injection sql | |
CN117370979A (zh) | 一种系统软件脱壳方法及装置 | |
WO2003019366A1 (fr) | Compression d'un programme en langage intermediaire |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2002790528 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 20028218094 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10491916 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 2002790528 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |