CN1991745A - Method for catching 64 bit information in 64 bit system by using 32 bit master program - Google Patents

Method for catching 64 bit information in 64 bit system by using 32 bit master program Download PDF

Info

Publication number
CN1991745A
CN1991745A CN 200510132894 CN200510132894A CN1991745A CN 1991745 A CN1991745 A CN 1991745A CN 200510132894 CN200510132894 CN 200510132894 CN 200510132894 A CN200510132894 A CN 200510132894A CN 1991745 A CN1991745 A CN 1991745A
Authority
CN
China
Prior art keywords
interception
function
information
bit
functions
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200510132894
Other languages
Chinese (zh)
Other versions
CN100424638C (en
Inventor
马春梅
陈玄同
刘文涵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo cas message technology applied research institute
Original Assignee
Inventec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Corp filed Critical Inventec Corp
Priority to CNB2005101328940A priority Critical patent/CN100424638C/en
Publication of CN1991745A publication Critical patent/CN1991745A/en
Application granted granted Critical
Publication of CN100424638C publication Critical patent/CN100424638C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a method of holding up 64 bit information with 32 bit main program in 64 bit system that includes following steps: setting 32 bit dynamic linkage program base which includes holding up function and 64 bit dynamic linkage program base which includes holding up function; setting several transferring module of 64 bit holding up function; setting 64 bit holding up function; generating a suit of communication service program; the 32 bit holding up function holds up all 32 bit program information running in the system and the 64 bit holding up function holds up all the 64 bit program information running in the system; sending information of shifting 32 bit holding up function and 64 bit holding up function; and 32 bit main program shifts 32 bit holding up function, at the same time 64 bit holding up function is shifted. The invention uses existing 32 bit main program and can be run in 64 bit system adopted in server and holds up 64 bit information with 64 bit holding up function.

Description

In 64 systems, utilize the method for 64 information of 32 master routine interceptions
Technical field
The present invention relates to a kind of method of 32 master routine intercept information, relate in particular to a kind of method of in 64 systems, utilizing 64 information of 32 master routine interceptions.
Background technology
At present, usually when realization is carried out Long-distance Control to remote server, its core technology is exactly the interception function operation mechanism that adopts in the Long-distance Control to the server (Windows Server) that uses the Windows system, this also is the mode that most of on the market similar softwares all adopt, its principle is exactly all information in the function interception system of comprehensively tackling in the using system, then arrive client (Client) by the kind of analytical information and the scope transmitted image that needs to upgrade, then client is presented at the image of correspondence on the local window again.The advantage of this mode is that each figure that transmits all is the figure that needs to upgrade the zone, rather than whole desktop pictures, has alleviated the pressure of Network Transmission to a certain extent and has improved transmission speed.
But when server adopts 64 systems, and master routine is 32, aforesaid way just problem occurred, 64 information of 64 programs that 32 interception functions in 32 master routines move in can't 64 systems of intercept server, client then can't obtain the data updated of needs so, as: the information of mouse etc.
Through discovering, 32 interception functions that move in 32 master routines only can be intercepted the information of 32 programs of 64 systems' operations, but can not successfully tackle the information of 64 programs of 64 systems' operations; And 64 interception functions can be intercepted the information of 64 programs of 64 systems operation, but can not successfully tackle the information of 32 programs of 64 systems' operations.Therefore, 32 master routines that server uses just can not be only with 32 interception functions or 64 interception functions if will tackle all information of the server working procedure that adopts 64 systems.
Summary of the invention
Technical matters to be solved by this invention is to provide a kind of method of utilizing 64 information of 32 master routines interceptions in 64 systems, in order to 32 master routines moving in the server that makes 64 systems can intercepting system all information.
To achieve these goals, the invention provides a kind of method of utilizing 64 information of 32 master routine interceptions in 64 systems, its characteristics are that the method includes the steps of:
(1) the dynamic link routine library of tackling function 32 comprise and 64 s' the dynamic link routine library of tackling function that comprises is set;
(2) a plurality of 64 interception function calls modules are set;
(3) these 64 interception functions are set;
(4) by these 32 information of tackling all 32 programs of moving in the intercepting api calls system, and by these 64 information of tackling all 64 programs of moving in the intercepting api calls system;
(5) produce a socket communication service program;
(6) send the information that removes these 32 interception functions and these 64 interception functions; And
(7) these 32 master routines remove these 32 interception functions, remove these 64 interception functions simultaneously.
The above-mentioned method of utilizing 64 information of 32 master routine interceptions in 64 systems, its characteristics are that these 64 interception function setup are after original 32 interception functions.
The above-mentioned method of utilizing 64 information of 32 master routines interception in 64 systems, its characteristics are that these 64 interception functions are comprehensively to tackle function, and it comprises in the dynamic link routine library of tackling function at these 64 and is provided with.
The above-mentioned method of utilizing 64 information of 32 master routine interceptions in 64 systems is characterized in that, these 64 interception function calls modules are background program, are used to be provided with these 64 interception functions.
The above-mentioned method of in 64 systems, utilizing 64 information of 32 master routine interceptions, its characteristics are, described each 64 interception function calls module invokes are somebody's turn to do a plurality of entrance functions in the dynamic link routine library of tackling function, and by this entrance function transmission provide to these 64 the interception function parameters, be provided with these 64 the interception functions.
The above-mentioned method of in 64 systems, utilizing 64 information of 32 master routine interceptions, its characteristics are, also comprise following steps:
When these 32 master routines remove these 32 interception functions, send the information that removes these 64 interception functions by this socket communication service program and tackle the function calls modules to these 64;
Receive the information that removes these 64 interception functions when these 64 interception function calls modules, tackle these entrance functions of function calls module invokes for these 64, remove these 64 interception functions; And
Send the information that these 64 interception functions have removed to these 32 master routines.
Effect of the present invention is that little to existing 32 master routine change amounts, 32 master routines that move change seldom basically, also do not need to recompilate into 64 programs in the system on the server of original employing 32-bit operating system.Originally 32 interception function parts need not be done any action.That is: use existing 32 master routines just can true(-)running in 64 systems that server adopts, and by 64 information of 64 interception intercepting api callses.
Adopt method of the present invention, can be adapted to all relative programs that use interception function mechanism in 64 Windows systems, also can not have influence on the use of this class method in 32 systems simultaneously.
Describe the present invention below in conjunction with the drawings and specific embodiments, but not as a limitation of the invention.
Description of drawings
Fig. 1 is the system block diagrams of 64 Windows systems of the present invention;
Fig. 2 is the method flow diagram of 64 information of interception in 32 master routines of the present invention;
Fig. 3 is the method flow diagram that removes 64 interception functions of the present invention; And
Fig. 4 uses the method flow diagram of 64 interception functions in 32 master routines for the present invention.
Wherein, Reference numeral:
100 32 master routines
220 32 comprise the dynamic link routine library of tackling function
310 64 interception function call modules
320 64 comprise the dynamic link routine library of tackling function
Step 101 is provided with the dynamic link routine library of tackling function 32 comprise and 64 s' the dynamic link routine library of tackling function that comprises
Step 102 is provided with a plurality of 64 interception function calls modules
Step 103 is provided with 64 interception functions
The information of all 32 programs of moving in 32 interceptions of step 104 intercepting api calls system, 64 information of tackling all 64 programs of moving in the intercepting api calls system
Step 105 produces a socket communication service program
Step 106 judges whether to send the information that removes the interception function
32 master routines of step 107 remove 32 interception functions, remove 64 interception functions simultaneously
Step 201 is provided with the dynamic link routine library of tackling function 64 comprise, and 64 interception functions are set, and this interception function is set
Step 202 produces a socket communication service program
Step 203 judges whether socket communication service program sends the information that removes 64 interception functions
Step 204 is called interception function program entrance function, removes the interception function, and sends the answer data
Step 301 is provided with a plurality of 32 and comprises the dynamic link routine library of tackling function, and 32 interception functions are set, and this interception function is set
Step 302 produces a socket communication service program
Step 303 is provided with a plurality of 64 and comprises the dynamic link routine library of tackling function, and 64 interception functions are set, and this interception function is set
Step 304 is handled 32 interception functions and 64 information that the interception function sends
Step 305 judges whether to send the information that removes 32 interception functions
Step 306 removes 32 interception functions
Step 307 adapter sleeve is connected the telecommunications services program, judges whether to send the information that removes 64 interception functions
Step 308 removes 64 interception functions
Embodiment
Please refer to Fig. 1, represented the system block diagrams of 64 Windows systems of the present invention among the figure, comprise: 32 master routines 100; 32 comprise the dynamic link routine library 220 of tackling function, be provided with or removed by above-mentioned 32 master routines 100, and these 32 comprise 32 information that the dynamic link routine library 220 of tackling function will intercept and are sent to above-mentioned 32 master routines 100; 64 interception function call modules 310 are provided with or are removed by above-mentioned 32 master routines 100, comprise the dynamic link routine library of tackling function in order to be provided with or to remove 64; 64 comprise the dynamic link routine library 320 of tackling function, and 64 information that intercept are sent to above-mentioned 32 master routines 100.
64 interception function call modules 310 are background programs, only play an effect that 64 interception functions are set, need offer the interception function parameters, can parameter be passed to this program by command mode, and program comprises entrance function in the dynamic link routine library 320 of tackling function 64 of run time call thus, so that 64 interception functions are set.
Because the interception function is to be applied to comprehensively, comprehensively tackle function and must be placed in the dynamic link routine library and be provided with, comprise the dynamic link routine library 320 of tackling function so need one 64.64 interception functions, 32 programs interceptions of fundamental sum function on the program is identical, just is compiled into the executive routine on 64 bit platforms.32 interception functions and 64 interception functions are all finished same job, exactly the information of intercepting is sent to 32 master routines 100, handled by the master routine unification, difference is that 64 interception functions can detect 64 information, and 32 interception functions can detect 32 information.
32 original master routines 100 still compile according to 32, and the part of required modification is exactly formerly to call 32 places that comprise the dynamic link routine library 220 of tackle function and increase above-mentioned 64 processes of tackling function call modules 310 that are provided with.In case 64 interception function setup, 64 interception function call modules 310 have not just had concrete meaning.To remove 64 interception functions when in 32 master routines 100, removing 32 interception functions too.
Remove 64 interception functions by socket (socket) communication service program in one embodiment of this invention, please refer to Fig. 3 now, this figure is the method flow diagram that the present invention removes 64 interception functions, as shown in the figure, the method that removes 64 interception functions of the present invention comprises following steps: step 201, the dynamic link routine library of tackling function 64 comprise is set, 64 interception functions are set, and this interception function is set; Step 202 produces a socket communication service program; Step 203 judges whether socket communication service program sends the information that removes 64 interception functions; Step 204 when sending this and remove information, is called interception function program entrance function, removes the interception function, and sends and answer data; If not sending this removes information, then 64 interception functions wait for that always this removes information.
In one embodiment of this invention, 32 master routines 100, its function provides service and gives client, makes the client computing machine at Control Server place fully.Along with the continuous upgrading of various computer hardware softwares and the appearance of 64 bit processors, so Microsoft has also released its 64 bit manipulation system, above-mentioned 32 programs are in order to use on the server of the 64 bit manipulation systems of employing, so use technology of the present invention.
As shown in Figure 2, this figure is the method flow diagram of 64 information of interception in 32 master routines of the present invention, comprises following steps:
Step 101, the dynamic link routine library of tackling function 32 comprise and 64 s' the dynamic link routine library of tackling function that comprises is set, this step is in order to be provided with 64 interception functions, that is: provide a plurality of entrance functions, in order to all information that all 64 programs that a plurality of 64 interception functions move on can interception system are set and unload 64 interception functions, 64 information of intercepting and capturing of interception function can convert the regional extent data that screen will upgrade as required to, send to 32 master routines and handle; Step 102 is provided with a plurality of 64 interception function calls modules, and the command line parameter when at first analytic system is called 64 interception functions obtains the entry address, in order to call the function that 64 interception functions are set; Step 103 is provided with 64 interception functions; Step 104, by 32 information of tackling all 32 programs of moving in the intercepting api calls system, and by 64 information of tackling all 64 programs of moving in the intercepting api calls system; Step 105, produce a socket communication service program, in order to monitor a certain port, in case there is the user to connect, then collect the data that it receives, judge its data content, if the data of making an appointment, illustrate that then 32 master routines need remove the interception function program, then send and remove the interception function information to 32 master routines; Step 106 judges whether to send the information that removes 32 interception functions; Step 107, when sending this and remove information, 32 master routines remove 32 interception functions, remove 64 interception functions, if not sending this removes information, then 32 interception functions wait for that always this removes information and sends.
Because 32 master routines 100 are in needs, be provided with 32 interception functions when having the client to connect, finish 64 interception functions are set after being provided with 32 interception functions exactly, and required command parameter also set, the order line number is the window handle etc. of reception information of 32 master routines 100 of agreement, in case carry out, 64 interception functions just can be started working, and 32 master routines can receive 64 and comprise the information that the dynamic link routine library 320 of tackling function sends.
In client's connection of breaking, perhaps under other some situation, server need remove the interception function, so program has produced a socket communication service program, be used for connecting the server that produces in the interception function operation, information is passed to server, waits for the information of returning from server simultaneously, then just can be removed by official confirmation interception function.
Its process flow diagram as shown in Figure 4, this figure is the method flow diagram that uses 64 interception functions in 32 master routines of the present invention, and comprise: step 301 is provided with a plurality of 32 dynamic link routine libraries of tackling function that comprises, 32 interception functions are set, and this interception function is set; Step 302 produces a socket communication service program; Step 303 is provided with a plurality of 64 dynamic link routine libraries of tackling function that comprises, and 64 interception functions are set, and this interception function is set; Step 304 is handled 32 interception functions and 64 information that the interception function sends; Step 305 judges whether 32 master routines send the information that removes 32 interception functions; Step 306 when sending this and remove information, removes 32 interception functions; If not sending this removes information, then 32 interception functions wait for that always this removes information and sends; Step 307 judges whether socket communication service program sends the information that removes 64 interception functions; Step 308 when sending this and remove information, removes 64 interception functions, if not sending this removes information, then 64 interception functions wait for that always this removes information and sends.
Certainly; the present invention also can have other various embodiments; under the situation that does not deviate from spirit of the present invention and essence thereof; those of ordinary skill in the art can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection domain of claim of the present invention.

Claims (6)

1, a kind of method of utilizing 64 information of 32 master routine interceptions in 64 systems is characterized in that the method includes the steps of:
(1) the dynamic link routine library of tackling function 32 comprise and 64 s' the dynamic link routine library of tackling function that comprises is set;
(2) a plurality of 64 interception function calls modules are set;
(3) these 64 interception functions are set;
(4) by these 32 information of tackling all 32 programs of moving in the intercepting api calls system, and by these 64 information of tackling all 64 programs of moving in the intercepting api calls system;
(5) produce a socket communication service program;
(6) send the information that removes these 32 interception functions and these 64 interception functions; And
(7) these 32 master routines remove these 32 interception functions, remove these 64 interception functions simultaneously.
2, the method for utilizing 64 information of 32 master routine interceptions in 64 systems according to claim 1 is characterized in that, these 64 interception function setup are after original 32 interception functions.
3, the method for utilizing 64 information of 32 master routines interception in 64 systems according to claim 1 is characterized in that, these 64 interception functions are comprehensively to tackle function, and it comprises in the dynamic link routine library of tackling function at these 64 and is provided with.
4, the method for utilizing 64 information of 32 master routine interceptions in 64 systems according to claim 1 is characterized in that, these 64 interception function calls modules are background program, are used to be provided with these 64 interception functions.
5, the method for in 64 systems, utilizing 64 information of 32 master routine interceptions according to claim 4, it is characterized in that, described each 64 interception function calls module invokes are somebody's turn to do a plurality of entrance functions in the dynamic link routine library of tackling function, and by this entrance function transmission provide to these 64 the interception function parameters, be provided with these 64 the interception functions.
6, the method for utilizing 64 information of 32 master routine interceptions in 64 systems according to claim 4 is characterized in that, also comprises following steps:
When these 32 master routines remove these 32 interception functions, send the information that removes these 64 interception functions by this socket communication service program and tackle the function calls modules to these 64;
Receive the information that removes these 64 interception functions when these 64 interception function calls modules, tackle these entrance functions of function calls module invokes for these 64, remove these 64 interception functions; And
Send the information that these 64 interception functions have removed to these 32 master routines.
CNB2005101328940A 2005-12-27 2005-12-27 Method for catching 64 bit information in 64 bit system by using 32 bit master program Expired - Fee Related CN100424638C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005101328940A CN100424638C (en) 2005-12-27 2005-12-27 Method for catching 64 bit information in 64 bit system by using 32 bit master program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005101328940A CN100424638C (en) 2005-12-27 2005-12-27 Method for catching 64 bit information in 64 bit system by using 32 bit master program

Publications (2)

Publication Number Publication Date
CN1991745A true CN1991745A (en) 2007-07-04
CN100424638C CN100424638C (en) 2008-10-08

Family

ID=38214022

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005101328940A Expired - Fee Related CN100424638C (en) 2005-12-27 2005-12-27 Method for catching 64 bit information in 64 bit system by using 32 bit master program

Country Status (1)

Country Link
CN (1) CN100424638C (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102662739A (en) * 2012-03-23 2012-09-12 深圳市文鼎创数据科技有限公司 Method and device for realizing function calling
CN104951375A (en) * 2015-07-01 2015-09-30 北京博睿宏远科技发展有限公司 Mobile phone APP performance data collecting method based on function interception technology
CN105446732A (en) * 2015-05-13 2016-03-30 北京天诚盛业科技有限公司 Operation realization method, device and system of 64-bit program

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1293502C (en) * 1999-06-30 2007-01-03 倾向探测公司 Method and apparatus for monitoring traffic in a network
CN1183452C (en) * 2000-02-24 2005-01-05 英业达股份有限公司 Passive program monitoring method
US20050027838A1 (en) * 2003-07-29 2005-02-03 Magid Robert Mark System and method for intercepting user exit interfaces in IMS programs

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102662739A (en) * 2012-03-23 2012-09-12 深圳市文鼎创数据科技有限公司 Method and device for realizing function calling
CN102662739B (en) * 2012-03-23 2015-04-22 深圳市文鼎创数据科技有限公司 Method and device for realizing function calling
CN105446732A (en) * 2015-05-13 2016-03-30 北京天诚盛业科技有限公司 Operation realization method, device and system of 64-bit program
CN104951375A (en) * 2015-07-01 2015-09-30 北京博睿宏远科技发展有限公司 Mobile phone APP performance data collecting method based on function interception technology
CN104951375B (en) * 2015-07-01 2017-12-08 北京博睿宏远数据科技股份有限公司 Cell phone application performance data acquisition method based on intercepting api callses technology

Also Published As

Publication number Publication date
CN100424638C (en) 2008-10-08

Similar Documents

Publication Publication Date Title
CN100345415C (en) Method and apparatus for perfoming boot, maintenance, or install operations on a storage area network
CN1791037A (en) Method for realizing Web service automatic test
CN1924863A (en) Method and system for operating software configured for internet access on a remote computer
CN1881174A (en) Computer switch and a computer switching method
CN1780299A (en) System and method for remotely controlling a debugging unit
CN1842073A (en) Method for realizing external device mapping of network computer
CN1943160A (en) System for invoking a privileged function in a device
CN1784056A (en) Short message service (SMS) remote control system and method of mobile communication terminal
CN101051941A (en) Process upgrading method and system
CN1494022A (en) Method accessing data bank through protocol agency mode
CN1889026A (en) KVM switching system and its mouse synchronizing method
CN1577277A (en) Managing program applications
CN1991745A (en) Method for catching 64 bit information in 64 bit system by using 32 bit master program
CN1750667A (en) Method for obtaining updating power information of mobile terminal
CN101035025A (en) Network device management method and system
CN101052194A (en) Device for realizing maintenance of far end radio frequency terminal by local maintenance terminal
CN1553332A (en) Facility centralizing management method based by plugging technology
CN1889462A (en) Method and system for realizing network management and network element configuration operation
CN1303054A (en) Virtual network device and its communication method
CN101060462A (en) A data recovery method, device, storage server and DHCP server
CN1901724A (en) Dispatching method for mobile communication system software version updating
CN102148869A (en) Method and device for JAVA application to transfer information to local
CN1251079C (en) Method for realizing data interaction between different systems
CN1946035A (en) Method for managing net element data configuration and net element
CN1270251C (en) Method for realizing interrupt request preprocessing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20191031

Address after: East area, 8th floor, No.19, Lane 299, Guanghua Road, Ningbo national high tech Zone, Ningbo City, Zhejiang Province

Patentee after: Ningbo cas message technology applied research institute

Address before: Taipei City, Taiwan, China

Patentee before: Yingda Co., Ltd.

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20081008

Termination date: 20191227

CF01 Termination of patent right due to non-payment of annual fee