CN101030241A - Method and system based on Keil C51 software protecting development - Google Patents

Method and system based on Keil C51 software protecting development Download PDF

Info

Publication number
CN101030241A
CN101030241A CNA2007100652861A CN200710065286A CN101030241A CN 101030241 A CN101030241 A CN 101030241A CN A2007100652861 A CNA2007100652861 A CN A2007100652861A CN 200710065286 A CN200710065286 A CN 200710065286A CN 101030241 A CN101030241 A CN 101030241A
Authority
CN
China
Prior art keywords
file system
keil
virtual file
software
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2007100652861A
Other languages
Chinese (zh)
Other versions
CN100492387C (en
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Feitian Technologies Co Ltd
Original Assignee
Beijing Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Feitian Technologies Co Ltd filed Critical Beijing Feitian Technologies Co Ltd
Priority to CNB2007100652861A priority Critical patent/CN100492387C/en
Publication of CN101030241A publication Critical patent/CN101030241A/en
Application granted granted Critical
Publication of CN100492387C publication Critical patent/CN100492387C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

A method for protecting and developing software based on keil C51 includes converting kernel program of software to be source code of C51 language, configuring file called by source-code debugging and hardware information of software protection unit in virtual file system, compiling source code to generate C51 local code and debugging source code, downloading C51 local code if successful and writing generated virtual file system mirror image into said protection unit. The system used for realizing said method is also disclosed.

Description

Method and system based on the software protection of Keil C51 exploitation
Technical field
The present invention relates to information security field, particularly a kind of method and system of developing based on the software protection of Keil C51.
Background technology
Keil C51 is the 51 serial compatible single-chip microcomputer C lingware development systems that U.S. Keil Software company produces.KeiluVision2 is the window application of a standard, integrated C51 compiler, A51 assembler, L51 connector, real time operating system, project manager and debugger etc., can finish whole development processs such as editor, compiling, link, debugging and emulation, the developer can use IDE (Integrated Development Environment, Integrated Development Environment) or other editing machine editor C or compilation source file, generate file destination (.OBJ file) by the compiling of C51 and A51 compiler respectively then.File destination can be created by LIB51 and generate library file, also can connect the location through L51 with library file and generate absolute object file (.ABS file).The absolute object file is converted to the Hex file of standard by OH51, the Hex file can be used by emulator, directly Target Board is debugged, also can be directly with Hex file write-in program memory, in EPROM (ErasableProgrammable Read-Only Memory, EPROM (Erasable Programmable Read Only Memory)).
Keil has defined an AGDI (Advanced Generic Debugger Interface, senior general debugger interface) interface, the user writes the IDE that DLL connects replicating machine and Keil by this interface, be Keil C51 Integrated Development Environment uVision2, the uVision2 debugger utilizes senior AGDI interface, and the uVision2 debugger is tied to goal systems.Keil also provides one group of DLL (dynamic link library) AGSI (Advanced Generic Simulator Interface, senior universal simulator interface), use this interface can develop the DLL consistent with hardware capability, embed this DLL to Keil C environment, direct exploitation C51 program under pure software environment just, the user can be on PC simulated target program, instruction set and sheet inner peripheral function fully.
The software simulation emulator is a kind of microcomputer development method, is equally applicable to the exploitation of software protection.This method is on PC, realizes emulation with software, and disposes a series of relevant service routines, as long as move this software package on PC, just can debug object code program during use.
So-called virtual machine, can be imagined as a machine of simulating to it with software, various hardware such as processor, internal memory, register are arranged in this machine, the various instructions of Simulation execution, the software that moves on this machine does not have specific (special) requirements to running environment, so virtual machine is transparent to the program of moving on it.For example, what the X86 virtual machine was simulated is the running environment of X86 instruction repertorie, and what the C51 virtual machine was simulated is the running environment of C51 instruction repertorie.
At present, the information safety devices manufacturer can realize certain virtual machine function in the hardware device of higher-end, therefore can in information safety devices, directly move code with the corresponding form of realizing of virtual machine, for example, the hardware manufacturer has realized the C51 virtual machine in information safety devices, present application mode is exactly that c program is compiled into the binary file that contains the C51 instruction by Keil C51 compiler, and the file of this form is exactly the executable file that can carry out on information safety devices.
File system is method and the data structure that operating system is used for the file on clear and definite disk or the subregion, i.e. the method for constituent act on disk also refers to be used for the disk or the subregion of storage file or file system kind.
Virtual File System is meant the behavior that comes the structure of constituent act and/or simulate a file system by software, and it realizes all or part of function of file system.
The software pirate version is the numerous developers' of puzzlement a great difficult problem always for many years; so having to just drop into energy in the performance history of software product, many developers go making software defencive function module; especially those prices are higher relatively, towards the professional software product of specific industry.But drop into energy and go to realize that the software protection function is not to receive special effect in a Products Development process, finally the protection effect that can reach not is always to be directly proportional with the energy that drops into.Relevant with software protection and encryption after all function development need according to the concrete characteristics of software product, be formulated the software protection scheme based on certain practical experience, and just sets about the amount body design of protection scheme at the initial stage of software development.The complicacy that realizes just because of the software protection function so the developer still can select the ready-made software protection series products of a cover mostly, and is gone in the later stage of software development is attached to oneself product.
In the product aspect numerous software protections, the lock of software cryptography for many years product remains the protected software product of being familiar with and being commonly used for everybody.Encryption lock also claims softdog, it is a kind of a kind of small hardware device that has separate CPU, RAM and nonvolatile memory, it can be connected with computing machine by the data communication interface of computing machine, can store, management data, and can preset the cryptographic algorithm function, but also the later stage customizes the part algorithm function voluntarily simultaneously.When a software product combines after encryption lock protects, software just can't leave encryption lock and normal operation, and this software product just intangibly has been bundled in encryption lock hardware, software just look like pinned by this device like, so the title encryption lock.
The file system of encryption lock and the file system of Windows are similar, are directory/file structure, and file comprises: executable file, data file and key file.Executable file is the file at the encryption lock internal operation.When application software is moved, call by the api interface of outside, import the input data into to this document, executable file returns to outside application program with the result behind the encryption lock internal operation.Data file is the file of store data information.Key file is the file of storage RSA key to (PKI and private key).
It is as follows to carry out a kind of encryption method principle of software protection based on encryption lock in the prior art: the software developer is written to the part of program in the encryption lock and needn't keeps this a part of copy on main frame, also can not occur in the internal memory of computing machine during program run; In software, be written into the position of that part of program of encryption lock, add calling encryption lock; During running software, these transplanted programs will be in encryption lock internal operation, and the result returned to software.Because a part of program of software is transplanted in the encryption lock, clearly, the software of installing has on computers left the just impossible operate as normal of encryption lock, thereby realizes the protection to software.
Above-mentioned software protection development process generally comprises following step:
1. exploitation: the software developer selects key code to pass through the compiler of encryption lock compatibility, these code compiles is become local code, i.e. executable file;
2. debugging: debug for transplanted code, it can be downloaded in the encryption lock and debug, also can come it is debugged by the real encryption lock equipment of software simulator emulation in PC;
3. download: after debug successfully, associated documents such as the executable file that executable file and executable file need be visited when moving, data file, key file download to encryption lock inside;
4. test: the software developer tests a whole set of software, comprises that the software to the executable file that downloads to encryption lock inside and PC end calls test;
5. produce: the software developer repeatedly step of repeated downloads carries out batch and fires.
There is following shortcoming in above-mentioned prior art:
1. if downloading to encryption lock debugs, then efficient is low, cost is high; If utilize software simulator emulation to debug, then can not simulate the function of real hardware fully, can not carry out hardware-related function such as software simulator;
2. in the process of firing and producing, related resource environment such as the executable file that the user is visited in the time of must getting the operation of executable program in the manual configuration debug process, data file, key file, and these files may be rewritten in debug process, be that pre-configured file and the file content in the debug process may be inequality, can cause firing environment and virtual environment is inconsistent, thereby can not guarantee accuracy; If the user reconfigures resource repeatedly, then make complicated operationization.
Summary of the invention
In order to address the above problem, the invention provides a kind of method and system of developing based on the software protection of Keil C51.
The method of developing based on the software protection of Keil C51 provided by the invention comprises:
The kernel program of software is converted to the source code of C51 language; The file of in Virtual File System, being visited during the described source code of configuration debugging and the hardware device information of software protecting equipment;
Compile described source code and generate the C51 local code, the Keil debugger is simulated the running status of described software protecting equipment, debugs described source code; After debugging successfully, the C51 local code after the debugging is downloaded in the described Virtual File System, and generate the Virtual File System mirror image; Described Virtual File System mirror image is write in the described software protecting equipment.
File or internal memory by computing machine are simulated described Virtual File System.
Described Virtual File System is independent software, storehouse or module.
Described Virtual File System can be realized virtual catalogue and/or file structure.
Before debugging described source code, described Keil debugger also comprises:
Write described Keil debugger by AGDI or AGSI interface.
Described method also comprises:
Described Keil debugger is revised the content of described Virtual File System in debug process.
Described method also comprises:
Described Keil debugger reads the file and the information of obtaining in the described Virtual File System in the described Virtual File System in debug process.
Described running status comprises input data and/or output data.
Described Virtual File System mirror image comprises the bibliographic structure information of described Virtual File System.
Described Virtual File System mirror image comprises the document structure information of described Virtual File System.
Described Virtual File System mirror image comprises the document content information in the described Virtual File System.
Described Virtual File System mirror image comprises the hardware device information of the described software protecting equipment in the described Virtual File System.
The hardware device information of described software protecting equipment comprises password information and/or ATR.
The system that develops based on the software protection of Keil C51 provided by the invention comprises:
Interface module is used to connect the integration environment of described system and Keil;
The Virtual File System configuration module is used for the file of being visited and the hardware device information of software protecting equipment when the source code of Virtual File System configuration debugging C51 language;
The system call module is used to call the function of realizing described software protecting equipment function;
C51 virtual machine module is used for explaining and execution C51 instruction, and debugs described source code by calling described system call module and described Virtual File System; The integration environment of Keil loads and/or calls described C51 virtual machine module by described interface module;
Download module is used for after debugging successfully, the C51 local code after the debugging is downloaded in the described Virtual File System, and generate the Virtual File System mirror image; Described Virtual File System mirror image is write in the described software protecting equipment; The integration environment of Keil loads and/or calls described download module by described interface module;
The hardware access module is used at described download module described Virtual File System mirror image being write the process of described software protecting equipment, communicates with described software protecting equipment.
Described interface module realizes AGDI interface or AGSI interface.
Described system call module also is used for being called to revise in described debug process the content of described Virtual File System.
Described system call module also is used for being called to read the file in the described Virtual File System and obtaining information in the described Virtual File System in described debug process.
The present invention can guarantee that the software developer simplifies the software protection performance history of oneself, can guarantee the accuracy of performance history again.Debugger can call Virtual File System in debug process; the centralized management executable file is at operation time institute's accessed resources environment; each link in the software protection exploitation need not to reconfigure these resource environments again; thereby reduced the probability of makeing mistakes; guaranteed accuracy, also simplified the software developer and carried out the software protection performance history.The Keil debugger of virtual combination file system is equivalent to the simulated environment of a true card, can finish the function of whole encryption lock built-in system functions, has overcome software simulator and can not simulate the problem of true hardware equipment function fully.
Description of drawings
Fig. 1 is the method flow diagram of the embodiment of the invention based on the software protection exploitation of Keil C51;
Fig. 2 is the system construction drawing of the embodiment of the invention based on the software protection exploitation of Keil C51.
Embodiment
The invention will be further described below in conjunction with the drawings and specific embodiments, but the present invention is not limited to the following examples.
Referring to Fig. 1, the embodiment of the invention provides a kind of method of developing based on the software protection of Keil C51, specifically may further comprise the steps:
Step 101: the software developer uses higher level lanquage to develop software;
Step 102: select kernel program, convert thereof into the source code of C51 language;
Step 103: the hardware device information of file of being visited when in Virtual File System, disposing the debug source code and the software protecting equipment of being visited;
Virtual File System can be by the file or the internal memory simulation of computing machine, and it can be independent software, storehouse or module, can realize virtual catalogue and/or file structure;
Step 104: the source code of compiling C51 language generates the C51 local code;
The running status of step 105:Keil debugger simulation softward protective device, the source code of debugging C51 language;
The Keil debugger is for to write by AGDI interface or AGSI interface, it can revise the content of Virtual File System in debug process, can also read file and the information of obtaining in the Virtual File System in the Virtual File System, wherein revise to be included in and create directory in the Virtual File System and/or file, deltree and/or file, write document content information; Running status comprises input data and/or output data;
Step 106: after debugging successfully, download the C51 local code in Virtual File System, and generate the Virtual File System mirror image;
The Virtual File System mirror image can comprise: one or more in bibliographic structure information, document structure information, document content information and the Virtual File System of Virtual File System in the hardware device information of software protecting equipment, wherein the hardware device information of software protecting equipment comprises password information and/or ATR (Answer To Reset, response automatically resets);
Step 107: the Virtual File System mirror image is write in the software protecting equipment.
Referring to Fig. 2, the embodiment of the invention also provides a kind of system that develops based on the software protection of Keil C51, specifically comprises:
(1) interface module 201, are used for the integration environment of connected system and Keil;
(2) the Virtual File System configuration module 202, are used for the file of being visited when the source code of Virtual File System configuration debugging C51 language and the hardware device information of software protecting equipment;
(3) system call module 203 is used to call the function of realizing the software protecting equipment function;
(4) C51 virtual machine module 204 is used for explaining and execution C51 instruction, and comes the debug source code by invoke system call module and Virtual File System; The integration environment of Keil loads and/or calls C51 virtual machine module by interface module;
(5) download module 205, are used for after debugging successfully, the C51 local code after the debugging is downloaded in the Virtual File System, and generate the Virtual File System mirror image; The Virtual File System mirror image is write in the software protecting equipment; The integration environment of Keil loads and/or calls download module by interface module;
(6) the hardware access module 206, are used at download module the Virtual File System mirror image being write the process of software protecting equipment, communicate with software protecting equipment.
Interface module 201 can realize AGDI interface or AGSI interface.
System call module 203 also is used for being called to revise in debug process the content of Virtual File System, wherein revises to be included in createing directory in the Virtual File System and/or file, deltrees and/or file, writes document content information.
System call module 203 also is used for being called to read the file in the Virtual File System and obtaining information in the Virtual File System in debug process.
Above-described embodiment is a more preferably embodiment of the present invention, and common variation that those skilled in the art carries out in the technical solution of the present invention scope and replacement all should be included in protection scope of the present invention.

Claims (17)

1. method based on the software protection of Keil C51 exploitation is characterized in that described method comprises:
The kernel program of software is converted to the source code of C51 language; The file of in Virtual File System, being visited during the described source code of configuration debugging and the hardware device information of software protecting equipment;
Compile described source code and generate the C51 local code, the Keil debugger is simulated the running status of described software protecting equipment, debugs described source code; After debugging successfully, the C51 local code after the debugging is downloaded in the described Virtual File System, and generate the Virtual File System mirror image; Described Virtual File System mirror image is write in the described software protecting equipment.
2. the method for developing based on the software protection of Keil C51 according to claim 1 is characterized in that, simulates described Virtual File System by the file or the internal memory of computing machine.
3. the method for developing based on the software protection of Keil C51 according to claim 1 is characterized in that described Virtual File System is independent software, storehouse or module.
4. the method for developing based on the software protection of Keil C51 according to claim 1 is characterized in that described Virtual File System can be realized virtual catalogue and/or file structure.
5. the method for developing based on the software protection of Keil C51 according to claim 1 is characterized in that, also comprises before described Keil debugger is debugged described source code:
Write described Keil debugger by AGDI or AGSI interface.
6. the method for developing based on the software protection of Keil C51 according to claim 1 is characterized in that described method also comprises:
Described Keil debugger is revised the content of described Virtual File System in debug process.
7. the method for developing based on the software protection of Keil C51 according to claim 1 is characterized in that described method also comprises:
Described Keil debugger reads the file and the information of obtaining in the described Virtual File System in the described Virtual File System in debug process.
8. the method for developing based on the software protection of Keil C51 according to claim 1 is characterized in that described running status comprises input data and/or output data.
9. the method for developing based on the software protection of Keil C51 according to claim 1 is characterized in that described Virtual File System mirror image comprises the bibliographic structure information of described Virtual File System.
10. the method for developing based on the software protection of Keil C51 according to claim 1 is characterized in that described Virtual File System mirror image comprises the document structure information of described Virtual File System.
11. the method for developing based on the software protection of Keil C51 according to claim 1 is characterized in that described Virtual File System mirror image comprises the document content information in the described Virtual File System.
12. the method for developing based on the software protection of Keil C51 according to claim 1 is characterized in that described Virtual File System mirror image comprises the hardware device information of the described software protecting equipment in the described Virtual File System.
13. the method for developing based on the software protection of Keil C51 according to claim 1 is characterized in that the hardware device information of described software protecting equipment comprises password information and/or ATR.
14. the system based on the software protection exploitation of Keil C51 is characterized in that described system comprises:
Interface module is used to connect the integration environment of described system and Keil;
The Virtual File System configuration module is used for the file of being visited and the hardware device information of software protecting equipment when the source code of Virtual File System configuration debugging C51 language;
The system call module is used to call the function of realizing described software protecting equipment function;
C51 virtual machine module is used for explaining and execution C51 instruction, and debugs described source code by calling described system call module and described Virtual File System; The integration environment of Keil loads and/or calls described C51 virtual machine module by described interface module;
Download module is used for after debugging successfully, the C51 local code after the debugging is downloaded in the described Virtual File System, and generate the Virtual File System mirror image; Described Virtual File System mirror image is write in the described software protecting equipment; The integration environment of Keil loads and/or calls described download module by described interface module;
The hardware access module is used at described download module described Virtual File System mirror image being write the process of described software protecting equipment, communicates with described software protecting equipment.
15. the system that develops based on the software protection of Keil C51 according to claim 14 is characterized in that described interface module realizes AGDI interface or AGSI interface.
16. the system of the software protection exploitation based on Keil C51 according to claim 14 is characterized in that, described system call module also is used for being called to revise in described debug process the content of described Virtual File System.
17. the system that develops based on the software protection of Keil C51 according to claim 14; it is characterized in that described system call module also is used for being called to read the file in the described Virtual File System and obtaining information in the described Virtual File System in described debug process.
CNB2007100652861A 2007-04-10 2007-04-10 Method and system for software protected development based on Keil C51 Active CN100492387C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2007100652861A CN100492387C (en) 2007-04-10 2007-04-10 Method and system for software protected development based on Keil C51

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2007100652861A CN100492387C (en) 2007-04-10 2007-04-10 Method and system for software protected development based on Keil C51

Publications (2)

Publication Number Publication Date
CN101030241A true CN101030241A (en) 2007-09-05
CN100492387C CN100492387C (en) 2009-05-27

Family

ID=38715580

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2007100652861A Active CN100492387C (en) 2007-04-10 2007-04-10 Method and system for software protected development based on Keil C51

Country Status (1)

Country Link
CN (1) CN100492387C (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101593258B (en) * 2008-05-28 2010-09-08 北京飞天诚信科技有限公司 System for realizing.Net virtual machine in software protection device and method thereof
CN101593257B (en) * 2008-05-27 2011-02-16 北京飞天诚信科技有限公司 System and method for protecting software based on.Net virtual machine
CN101309183B (en) * 2008-05-04 2011-04-13 北京深思洛克软件技术股份有限公司 Method for remote test and developing software protecting apparatus
CN102193829A (en) * 2011-05-20 2011-09-21 深圳市江波龙电子有限公司 Method and device for calling local interface of virtual machine
CN103425911A (en) * 2013-08-07 2013-12-04 北京深思数盾科技有限公司 Method for enhancing software protection usability
CN103514027A (en) * 2013-11-12 2014-01-15 北京深思数盾科技有限公司 Method for enhancing usability of software protection
CN107329889A (en) * 2017-06-05 2017-11-07 芯海科技(深圳)股份有限公司 A kind of method of C compilers automatic test
CN108268732A (en) * 2018-01-25 2018-07-10 金肯职业技术学院 A kind of method based on Keil software simulation systems and its emulation flexible circuit board
CN109388576A (en) * 2018-10-29 2019-02-26 无锡中微爱芯电子有限公司 A kind of artificial debugging tool based on AGDI interface
CN110764821A (en) * 2019-09-05 2020-02-07 浙江中科领航汽车电子有限公司 Qt-based singlechip graphical interface simulation system and method

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309183B (en) * 2008-05-04 2011-04-13 北京深思洛克软件技术股份有限公司 Method for remote test and developing software protecting apparatus
CN101593257B (en) * 2008-05-27 2011-02-16 北京飞天诚信科技有限公司 System and method for protecting software based on.Net virtual machine
CN101593258B (en) * 2008-05-28 2010-09-08 北京飞天诚信科技有限公司 System for realizing.Net virtual machine in software protection device and method thereof
CN102193829A (en) * 2011-05-20 2011-09-21 深圳市江波龙电子有限公司 Method and device for calling local interface of virtual machine
CN103425911A (en) * 2013-08-07 2013-12-04 北京深思数盾科技有限公司 Method for enhancing software protection usability
CN103514027A (en) * 2013-11-12 2014-01-15 北京深思数盾科技有限公司 Method for enhancing usability of software protection
CN103514027B (en) * 2013-11-12 2017-04-26 北京深思数盾科技股份有限公司 Method for enhancing usability of software protection
CN107329889A (en) * 2017-06-05 2017-11-07 芯海科技(深圳)股份有限公司 A kind of method of C compilers automatic test
CN108268732A (en) * 2018-01-25 2018-07-10 金肯职业技术学院 A kind of method based on Keil software simulation systems and its emulation flexible circuit board
CN108268732B (en) * 2018-01-25 2019-10-11 金肯职业技术学院 A method of based on Keil software simulation system and its artificial circuit plate
CN109388576A (en) * 2018-10-29 2019-02-26 无锡中微爱芯电子有限公司 A kind of artificial debugging tool based on AGDI interface
CN110764821A (en) * 2019-09-05 2020-02-07 浙江中科领航汽车电子有限公司 Qt-based singlechip graphical interface simulation system and method

Also Published As

Publication number Publication date
CN100492387C (en) 2009-05-27

Similar Documents

Publication Publication Date Title
Olivier et al. A binary-compatible unikernel
CN101030241A (en) Method and system based on Keil C51 software protecting development
JP6122493B2 (en) Adaptively portable library
TWI648648B (en) Protection method of executable program on android platform
Lin et al. Benchmark dalvik and native code for android system
Ratabouil Android NDK: beginner's guide
US8621279B1 (en) System and method for generating emulation-based scenarios for Error Handling
CN107526625B (en) Java intelligent contract security detection method based on bytecode inspection
Batyuk et al. Developing and benchmarking native linux applications on android
Andrus et al. Cider: Native execution of ios apps on android
US20040083467A1 (en) System and method for executing intermediate code
CN115629971A (en) Application development system and method
CN111832014A (en) Dynamic loading-based Java SDK code encryption and decryption method and terminal
Spear et al. Solving the starting problem: device drivers as self-describing artifacts
US9141356B2 (en) Process for generating dynamic type
Kang Function call interception techniques
Olivier et al. A syscall-level binary-compatible unikernel
US20170052765A1 (en) Method and system for creating app
US20170083298A1 (en) Resilient format for distribution of ahead-of-time compiled code components
CN115220873A (en) Method for running Open Harmony application in Android system
CN101593257B (en) System and method for protecting software based on.Net virtual machine
Andersen et al. Design, implementation, and evaluation of the Resilient Smalltalk embedded platform
Viarheichyk Embedded Programming with Modern C++ Cookbook: Practical recipes to help you build robust and secure embedded applications on Linux
RU2521265C2 (en) System and method for automatic processing of software system errors
Osborne The postroom computer

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: FEITIAN CHENGXIN TECHNOLOGY CO., LTD.

Free format text: FORMER NAME: BEIJING FEITIAN CHENGXIN SCIENCE + TECHNOLOGY CO. LTD.

CP03 Change of name, title or address

Address after: 100085 Beijing city Haidian District Xueqing Road No. 9 Ebizal building B block 17 layer

Patentee after: Feitian Technologies Co.,Ltd.

Address before: 100083, Haidian District, Xueyuan Road, No. 40 research, 7 floor, 5 floor, Beijing

Patentee before: FEITIAN TECHNOLOGIES Co.,Ltd.

CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 17th floor, building B, Huizhi building, No.9, Xueqing Road, Haidian District, Beijing 100085

Patentee after: Feitian Technologies Co.,Ltd.

Country or region after: China

Address before: 100085 17th floor, block B, Huizhi building, No.9 Xueqing Road, Haidian District, Beijing

Patentee before: Feitian Technologies Co.,Ltd.

Country or region before: China

OL01 Intention to license declared
OL01 Intention to license declared