CA2091076A1 - Method for storing programs - Google Patents

Method for storing programs

Info

Publication number
CA2091076A1
CA2091076A1 CA 2091076 CA2091076A CA2091076A1 CA 2091076 A1 CA2091076 A1 CA 2091076A1 CA 2091076 CA2091076 CA 2091076 CA 2091076 A CA2091076 A CA 2091076A CA 2091076 A1 CA2091076 A1 CA 2091076A1
Authority
CA
Canada
Prior art keywords
program
image
computer
instructions
examining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA 2091076
Other languages
French (fr)
Inventor
Eric Straub
Mike Dryfoos
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Corp
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of CA2091076A1 publication Critical patent/CA2091076A1/en
Abandoned legal-status Critical Current

Links

Abstract

METHOD FOR STORING PROGRAMS

Abstract of the Disclosure A program is stored in the memory of a computer to create an image of the program. The image of the program is examined for information indicating whether the program is compatible with the configuration of the computer. If necessary, the image of the program is revised so that the program will operate properly with the configuration of the computer. In a first embodiment of the invention, information identifying a configuration of a computer system with which the program is compatible is associated with the image of the program. In a second embodiment of the invention, a predetermined set of instructions and data are replaced with alternate instructions and data.

Description

20!3~ 07~

DescriptiOn METHOD FOR STORING PROGRAMS

Technical Field of the Invention The present invention is directed toward a method for storing programs in personal computer memory and, more particularly, is directed toward a method for storing programs in the lowest available region of a 10 personal computer memory.

Baclcground of the Invention Application programs that are executed by a personal computer are typically stored in the conventional memory region of the computer's 15 memory space. Since the designers of the programs expect these programs to bestored in the conventional memory region, they have been designed to be executed from this region. For this reason, some of these programs are not capable of being operated from the lowest availa~le memory region of the computer memory.
As an example, commercially available application programs designed to be executed by a personal computer are typically stored in a manner to minimize the amount of non-volatile media neçessary to contain the application program. One manner of storing these application programs to rninimize the amount of fixed storage medium necessary to contain the 25 application program is to operate upon the application program with a storage- maximization program. One such storage maxirnization program, referred to as EXEPACK, converts the application program from one form to another equ*alent form, wherein the equivalent form takes less storage space.
However, in certain computer configurations, a program that has been 30 EXEPACKed does not operate properly if it is loaded in the lowest available region of the computer's memory space.
As another example, programs that use the Rational DOS
Extender do not operate properly when they are loaded in the lowest available `~ region of the computer's memory space. Accordingly, it is desirable to provide a 35 method for loading programs from a fixed storage medium to the computer's memory space wherein the programs can be loaded in substantially any region of the computer's memory space.
:,, ~, 2 2a~ 76 Along these lines, many programs rely upon a version number of the operating system to determine whether the program is compatible with the operating system, ie., whether the program is capable of being properly executed using the operating system of the personal computer. However, a 5 program that was written prior to the existence of a new operating system, or prior to the existence of a new version of an old operating system, may not recognize that it is compatible with the new or revised operating system by the version number. Accordingly, to be able to run the program with the new operating system, the program must be revised so that it will recognize the new 10 operating system. Accordingly, it is desirable to provide a method for loading a program into computer memory and revising a program to indicate that it is operable with the operating system associated with the computer rnemory.

Summarv of the Invention The present invention provides a method for storing a program into a computer for execution wherein the computer includes a computer memory and wherein the computer has a predetermined configuration. The '~ method includes the step of reading the program from a fixed storage medium and storing an image of the progra n into the computer memory. The method 20 further includes the step of examining at least a portion of the image of theprogram for information indicating the compatibility of the program with the configuration of the computer and revising the image of the program to enable the program to operate properly with the predetermined configuration of the computer.
In a first embodiment of the invention, the program includes a program name. The step of examining at least a portion of the image of the program further includes the steps of storing a table of program names and associated computer system identi~lers in the computer memory. Also, the step of examining at least a portion of the image of the program includes the substep30 of referencing the table of program names for the associated computer system identifier, and storing the associated computer system identifier in a storage region associated with the image of the program.
In a second embodiment of the invention, the step of examining at least a portion of the program comprises the substep of examining the set of 35 instructions of the image of the program to determine whether the image of the program contains a predetermined set of program instructions and, if so, ., 3 20~.07S

replacing the predetermined set of program instructions with a set of alternate instructions.

Bri~Description of the Drawings S Figure 1 is a decision flow diagrarn illustrating the method of the subject invention;
Figure 2 is a decision flow diagram illustrating the method for storing version numbers so that old programs are operable with new operating systems; and Figure 3 is a decision flow diagram of a method for patching programs.

Detailed Description of the Invention The present invention provides a method for storing a program 15 into the memory of a personal computer. As is known in the art, personal computers typically include a computer memory space defined in large measure by the addresses that the personal computer is capable of accessing. This computer memory space is typically Random Access Memory (RAM) or other similar memory capable of being quickly accessed by the personal computer.
Within the computer's memory space is typically stored an operating system for interfacing application prograrns with the hardware of the personal computer. ~n one embodiment of the invention, the personal computer includes the DOS operating system. However, the method of the subject invention is equally applicable with personal computers configured with other operating systems. Similarly, although the invention is described herein by reference to a personal computer, those skilled irl the art will recognize that the invention is equally applicable to other computer systems. An example of a computer system capable of being used with the subject invention is described inCdn. Patent Application Ser. No. , entitled Improved Method For 30 Loading Programs, by Eric Straub et al., filed concurrently with this application, the disclosure of which is incorporated herein, in its entirety, by the foregoing reference thereto.
Prior to executing an application program, personal computers typically read the application program from a fixed storage medium. As 35 examples, application programs may be stored on floppy disks, magnetic tape, the computer's hard drive, etc. To execute the program, the personal computer copies the program from the fixed storage medium into its computer memory.

~.
.
,~.. ~ .. . , ;.; .

. ~ ~ . ; -.- -20~Q76 This allows the personal computer to execute the program very quickly since the personal computer can access its computer memory much quiclcer than it can access a fixed storage medium.
In accordance with the subject invention, the personal computer S examines at least a portion of the image of the program for information indicating compatibility of the program with the configuration of the personal computer and, revises the image of the program if necessary to enable the program to be operable with the personal computer as configured.
One aspect of the invention is to examine the image of the 10 program for information identifying the program. Most application programs rely upon information provided by the personal computer to determine whether the program is operable, or compatible, with the particular configuration of thepersonal computer. As an example, some application programs rely upon the version number of the operating system (OS) of the personal computer to ` 15 determine whether the program is compatible with the personal computer. If the operating system of a particular computer con~lguration, or a version of theoperating system of the computer configuration, was not in existence at the timethe application program was released, then the application program may not recognize the operating system by its version number and, therefore, will not be20 able to properly determine that it is compatible with the operating system. The ; subject invention provides a method for revising the image of the application program to accurately indicate compatibility of the application program with theoperating system.
Another aspect of the invention is to exarnine the image of the 25 program to determine whether the program is capable of being properly executed with the configuration of the personal computer. Since some personal computers are configured to load programs into the lowest available region of the computer's memory space, and since some programs are not capable of being operated properly from this region, a personal computer so configured 30 must determine whether the program can be properly operated from the lowest available region of its memory space. This determination is made by examining at least a portion of the program for a predetermined set of instructions. If the ~; predetermined set of instructions are found, then the personal computer determines that the program is not capable of being executed properly and 35 revises the image of the program so that the program is operable with the configuration of the subject personal computer.

., .. . .

. , . , ~, ;
. , , , . ~ :
~ ~ .. . . ..

20~107~

A presently preferred embodiment of the invention is illustrated in Figure 1. The personal computer reads the program from the fixed storage medium, step 100 tFigure 1). The program read from the fixed storage medium is stored in the memory space of the personal computer, thereby creating an S image of the program stored on the fixed storage medium. The personal computer then examines the program image, step 102, for information identifying the program to determine whether the program recognizes the configuration of the personal computer, step 104. If the program does not recognize the configuration of the personal computer, then the program will not - 10 be able to determine that it is compatible with the configuration of the personal computer and will not execute properly. Accordingly, the personal computer will revise the image of the prograr4 step 106, so that the program will recognize the configuration of the personal computer and will therefore be capable of proper execution with the personal computer con~lguration.
In addition to determining whether the program is compati~le with the operating system of the personal computer, the personal computer also deterrnines whether the program is operable from the lowest a~ailable region of the computer's memory space, step 105. As will be discussed in more detail below, one method of determining whether the personal computer is operable 20 from the lowest available region of the computer's memory space is to examinethe image of the program for a predetermined set of instructions. If the program is not operable from the lowest available region of the computer's memory space, then the image of the program is revised, step 110, so that it canbe operated from substantially anywhere in the computer's memory.
With reference to Figure 2, a more detailed description of the method for revising the image of the program to indicate compatibility with the operating system of the personal computer will be descAbed. Initially, a table of program names and version numbers is stored in the personal computer, step 201. Preferably, the storage of the table referred to step 201 is done when the 30 personal computer is first configured or designed, however, the table may be stored, or revised, at any time. The table is an index of program names and version numbers of operating systems that indicate compatibility of the program with the operating system of the personal computer. In a presently preferred embodiment of the invention, the personal computer is configured with DOS
35 version 5. The table will contain the names of prograrns and prior version numbers of DOS with which the program is compatible. Those skilled in the art will recognize, however, that a wide variety of information may be stored in the :, .

2Q~lQ7~

table to identify the application programs and to associate the application programs with information to indicate compatibility of the application prograrn with the configuration of the personal computer.
After the program is loaded into the memory space of the 5 personal computer, as described above by reference to step 100 of Figure 1, the personal computer reads the name of the program, step 202. In the embodiment of the invention described herein, the name of the program is the information used by the personal computer to identify the program and determine whether the program will recognize the operating system of the 10 personal computer, however, other information could be used for this purpose.Thereafter, the personal computer references the table to obtain the version number associated with the name of the program and stores this version number in the program segment prefix (PSP) of the image of the program, step 203.
The image of the program is now revised so that the program will 15 be compatible with the configuration of the personal computer. The program may then be executed in accordance with steps 204-207. During execution of the program, step 204, the personal computer determines whether the program is requesting the version number of the operating system, step 205, and, if so, i- reports the version number stored in the program segment prefix (PSP) of the 20 image of the program, step 206. In this manner, the information provided to the program will properly indicate its compatibility with the configuration of the personal computer. The program execution continues in its normal manner, step 207.
It will be apparent to those skilled in the art that the table 25 described above need not store compatibility information fcr programs that recognize the configuration of the personal computer. Further, some prograrns will not be compatible with the personal computer as configured. Accordingly, the table described above by reference to step 201 only contains the names, and compatible version numbers, for programs that are compatible with the 30 configuration of the personal computer but may not recognize their compatibility by the version number. For all other programs, the actual version number of the operating system is stored in the program segment prefix, ie., DOS 5 in the embodiment of the invention discussed above.
With reference to Figure 3, a more detailed description of the 35 method for revising the image of the program so that the program can be properly executed with the configuration of the personal computer will be described. Generally, the subject method is provided for revising programs that . , ~' - ~ . . .. . .

2~9~0~

.
are not operable with personal computers constructed to store the image of the program in the lowest available region of the computer's memory space. Two types of programs are currently known to include instructions and/or data that make the program inoperable when stored in the lowest available region of the 5 computer's memory space, ie., EXEPACKed programs and programs that use the Rational DOS Extenders.
Accordingly, the subject method determines whether the program is EXEPACKed, step 301, and, if so, examines the image of the program for a first predetermined set of instructions and data and replaces the first 10 predetermined set of instructions and data with a first alternate set of instructions and data, step 302. The first set of instructions and data are those that render the program inoperable when stored in the lowest available region of the computer's memory space. The first alternate set of instructions and dataare selected to perform the same function as the first set of instructions and data 15 are designed to do when the program is stored in the upper region of the computer's memory space.
Similarly, the method determines whether the program uses the Rational DOS Extenders, step 304, and, if so, examines the image of the program for a second predetermined set of instructions and data and replaces 20 the second predetermined set of instructions and data with a second alternateset of instructions and data, step 305. The second set of instructions and data are those that render a program that uses the Rational DOS Extenders inoperable when stored in the lowest available region of the computer's memory space. The second alternate set of instructions and data are selected to perform25 the same function as the second set of instructions and data are designed to do ` when the program is stored in the upper region of the computer's memory space.
It will be apparent to those skilled in the art that the method of ~; replacing a predetermined set of instructions and/or data with an alternate set 30 of instructions and/or data so that the program will be operable with the configuration of the personal computer may be used to revise the image of a wide variety of programs to cure problems of apparent incompatibility of the program with the personal computer. Further, those skilled in the art will recognize that in accordance with this portion of the subject method, it is not 35 important that the personal computer recognize any particular program but, instead, that the personal computer recognize the set of instructions and/or data ~'! that needs to be replaced.
,:~
:3 '-,!;
~ ., : ;~:: : :: :

20~7~

Those skilled in the art will recognize that although the invention has been described herein as a method for revising an application program so that the application program will be compatible with a particular cor~lguration of a personal computer, the method does not strictly speaking revise the 5 program. Instead, the image of the program that is stored in the computer's memory is revised so that the program will operate properly from that image.
The program as stored on the non-volatile media remains unchanged.
Further, along these lines, in the case of revising the image of the application program to indicate compatibility of the application program with 10 the configuration of a personal computer, the portion of the image that is revised is that portion that is created by the operating system during the load process to describe the application program and its operation. Accordingly, the subject invention comprises an method for revising both the executable portion of an image of an application program and the descriptive portion of an image 15 of an application program.
It will be apparent to those skilled in the art that although only several presently preferred embodiments of the invention have been described in detail herein, many modifications and variations may be provided without departing from the true scope and spirit of the invention. Accordingly, the ~0 invention is not limited except as by the appended claims.
.

:
. .. - . ... ~ ..
- ,-.
~ :` ' ' ., ` ' '

Claims (15)

1. A method for loading a program from a fixed storage medium into computer memory wherein the program has a program name and wherein the computer has an operating system, said method comprising the steps of:
(a) storing a table of program names and associated version numbers in the computer memory wherein the version numbers identify versions of the operating system of the computer with which the program identified by the associated name is compatible;
(b) reading the program from the fixed storage medium and storing an image of the program into the computer memory wherein the image of the program includes all information associated with the program;
(c) reading the program name, referencing the table of program names for the associated version number, and storing the associated version number in the program segment prefix region of the image of the program;
(d) examining the image of the program to determine whether the program has been EXEPACKed and, if so, revising the image of the program so thatthe program can be stored substantially anywhere in the computer memory; and (e) examining the image of the program to determine whether the program uses the Rational DOS Extender and, if so, revising the image of the program so that the program can be stored substantially anywhere in the computermemory.
2. The method as recited in claim 1, further comprising the step of (f) executing the program from the image of the program, determining when the program requests a version number of the operating system, and providing the program with the version number stored in the program segment prefix region of the image of the program.
3. The method as recited in claim 1 wherein step (d), examining the image of the program to determine whether the program has been EXEPACKed, comprises the substeps of:
(f) replacing a predetermined set of instructions and data of the image of the program with an alternate set of instructions and data.
4. The method as recited in claim 1 wherein step (d), examining the image of the program to determine whether the program uses the Rational DOS
Extender, comprises the substeps of:
(f) replacing a predetermined set of instructions and data of the image of the program with an alternate set of instructions and data.
5. A method for storing a program in a computer for execution wherein the computer includes a computer memory and wherein the computer has a predetermined configuration, said method comprising the steps of:
(a) reading the program and storing an image of the program into the computer memory wherein the program image includes all information associated with the program; and (b) examining at least a portion of the image of the program for information indicating compatibility of the program with the configuration of the computer and revising the image of the program to enable the program to operate properly with the predetermined configuration of the computer.
6. The method as recited in claim 5 wherein the program includes information identifying the program and wherein step (b), examining at least a portion of the image of the program comprises the substeps of:
(c) storing a table of information having a plurality of entries wherein each entry associates information identifying a program with informationidentifying a configuration of a computer with which the identified program is compatible;
(d) examining the program for information identifying the program and referencing the table to obtain the information identifying a configuration of a computer associated with the identified program; and (e) associating the information identifying a configuration of a computer obtained from the table with the image of the program.
7. The method as recited in claim 6 further comprising the step of:
(f) executing the program from the image of the program determining when the program requests information identifying the predetermined configuration of the computer, and providing the program with the information identifying a configuration of a computer associated with the image of the program.
8. The method as recited in claim 5 wherein the program further includes a program name and wherein step (b), examining at least a portion of the image of the program, comprises the substeps of:
(c) storing a table of program names and associated version numbers in the computer memory wherein the version numbers identify alternate configurations of the computer with which the program identified by the associated name is compatible; and (d) reading the program name, referencing the table of program names for the associated version number, and storing the associated version number in a storage region associated with the image of the program.
9. The method as recited in claim 8, further comprising the step of:
(e) executing the program from the image of the program, determining when the program requests a version number, and providing the program with the version number stored in the storage region associated with the image of the program.
10. The method as recited in claim 5 wherein step (b), examining at least a portion of the program, comprises the substep of:
(c) examining the set of instructions and data of the image of the program to determine whether the image of the program contains predetermined information and, if so, replacing the predetermined information with alternate information.
11. The method as recited in claim 10 wherein step (c), examining the set of instructions and data, comprises the substep of:
(d) examining the set of instructions and data of the image of the program to determine whether the image of the program contains predetermined instructions and data and, if so, replacing the predetermined instructions and data with alternate instructions and data.
12. The method as recited in claim 11 wherein the predetermined set of program instructions and data comprises instructions and data associated with an EXEPACKed program, said method further comprising the step of:
(e) storing a set of alternate instructions and data for enabling the EXEPACKed program to be operated from the lowest available region of the computer memory.
13. The method as recited in claim 11 wherein the predetermined set of program instructions and data comprises instructions and data associated with a program that uses the Rational DOS Extender, said method further comprising the step of:
(e) storing a set of alternate instructions for enabling the program using the Rational DOS Extender to be operated from the lowest available region of the computer memory.
14. The method as recited in claim 5 wherein step (b), examining at least a portion of the program, comprises the substep of:
(c) examining the image of the program to determine whether the program has been EXEPACKed and, if so, revising the image of the program so thatthe program can be stored substantially anywhere in the computer memory.
15. The method as recited in claim 5 wherein step (b), examining at least a portion of the program, comprises the substep of:
(c) examining the image of the program to determine whether the program uses the Rational DOS Extender and, if so, revising the image of the program so that the program can be stored substantially anywhere in the computermemory.
CA 2091076 1992-03-06 1993-03-05 Method for storing programs Abandoned CA2091076A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US81752592A 1992-03-06 1992-03-06
US07/817,525 1992-03-06

Publications (1)

Publication Number Publication Date
CA2091076A1 true CA2091076A1 (en) 1993-09-07

Family

ID=25223271

Family Applications (1)

Application Number Title Priority Date Filing Date
CA 2091076 Abandoned CA2091076A1 (en) 1992-03-06 1993-03-05 Method for storing programs

Country Status (2)

Country Link
JP (1) JPH0651962A (en)
CA (1) CA2091076A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110287346A (en) * 2019-06-28 2019-09-27 深圳云天励飞技术有限公司 Date storage method, device, server and storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2680236B1 (en) 2011-02-22 2020-12-30 Glory Ltd. Coin depositing and dispensing machine

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110287346A (en) * 2019-06-28 2019-09-27 深圳云天励飞技术有限公司 Date storage method, device, server and storage medium
CN110287346B (en) * 2019-06-28 2021-11-30 深圳云天励飞技术有限公司 Data storage method, device, server and storage medium

Also Published As

Publication number Publication date
JPH0651962A (en) 1994-02-25

Similar Documents

Publication Publication Date Title
EP0559221B1 (en) Method for storing programs
US5526523A (en) Interface between operating system and operating system extension
US6449716B1 (en) Dual use master boot record
US5559960A (en) Software anti-virus facility
CA2050834C (en) Multiple controlled data-space facility
US6324546B1 (en) Automatic logging of application program launches
EP0665496B1 (en) Method and apparatus for run-time error checking using dynamic patching
US7711696B2 (en) File system for nonvolatile memory
US5835743A (en) Application binary interface and method of interfacing binary application program to digital computer
US8417916B2 (en) Perform frame management function instruction for setting storage keys and clearing blocks of main storage
US8176142B2 (en) Shared JAVA jar files
US20040193564A1 (en) Robust, self-maintaining file system
US7783854B2 (en) System and method for expandable non-volatile storage devices
US5553286A (en) System and method for preparing a computer program for execution
US7996833B2 (en) Method and system for replacing instructions and instruction blocks in computer code
US7376821B2 (en) Data processing system and method
US5175830A (en) Method for executing overlays in an expanded memory data processing system
US6782446B2 (en) Method to prevent corruption of page tables during flash EEPROM programming
US5787495A (en) Method and apparatus for selector storing and restoration
US5388244A (en) Controls for initial diversion of page-frame logical content as part of dynamic virtual-to-real translation of a virtual page address
US20020087956A1 (en) System and method for linear processing of software modules
CN110928840B (en) Method for reading QNX6 file system
CA2091076A1 (en) Method for storing programs
JPH0192856A (en) Apparatus and method for protecting main memory unit using access and defect logic signal
Gehringer Variable-length capabilities as a solution to the small-object problem

Legal Events

Date Code Title Description
EEER Examination request
FZDE Dead