CN1991745A - Method for catching 64 bit information in 64 bit system by using 32 bit master program - Google Patents
Method for catching 64 bit information in 64 bit system by using 32 bit master program Download PDFInfo
- Publication number
- CN1991745A CN1991745A CN 200510132894 CN200510132894A CN1991745A CN 1991745 A CN1991745 A CN 1991745A CN 200510132894 CN200510132894 CN 200510132894 CN 200510132894 A CN200510132894 A CN 200510132894A CN 1991745 A CN1991745 A CN 1991745A
- Authority
- CN
- China
- Prior art keywords
- interception
- function
- information
- bit
- functions
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention relates to a method of holding up 64 bit information with 32 bit main program in 64 bit system that includes following steps: setting 32 bit dynamic linkage program base which includes holding up function and 64 bit dynamic linkage program base which includes holding up function; setting several transferring module of 64 bit holding up function; setting 64 bit holding up function; generating a suit of communication service program; the 32 bit holding up function holds up all 32 bit program information running in the system and the 64 bit holding up function holds up all the 64 bit program information running in the system; sending information of shifting 32 bit holding up function and 64 bit holding up function; and 32 bit main program shifts 32 bit holding up function, at the same time 64 bit holding up function is shifted. The invention uses existing 32 bit main program and can be run in 64 bit system adopted in server and holds up 64 bit information with 64 bit holding up function.
Description
Technical field
The present invention relates to a kind of method of 32 master routine intercept information, relate in particular to a kind of method of in 64 systems, utilizing 64 information of 32 master routine interceptions.
Background technology
At present, usually when realization is carried out Long-distance Control to remote server, its core technology is exactly the interception function operation mechanism that adopts in the Long-distance Control to the server (Windows Server) that uses the Windows system, this also is the mode that most of on the market similar softwares all adopt, its principle is exactly all information in the function interception system of comprehensively tackling in the using system, then arrive client (Client) by the kind of analytical information and the scope transmitted image that needs to upgrade, then client is presented at the image of correspondence on the local window again.The advantage of this mode is that each figure that transmits all is the figure that needs to upgrade the zone, rather than whole desktop pictures, has alleviated the pressure of Network Transmission to a certain extent and has improved transmission speed.
But when server adopts 64 systems, and master routine is 32, aforesaid way just problem occurred, 64 information of 64 programs that 32 interception functions in 32 master routines move in can't 64 systems of intercept server, client then can't obtain the data updated of needs so, as: the information of mouse etc.
Through discovering, 32 interception functions that move in 32 master routines only can be intercepted the information of 32 programs of 64 systems' operations, but can not successfully tackle the information of 64 programs of 64 systems' operations; And 64 interception functions can be intercepted the information of 64 programs of 64 systems operation, but can not successfully tackle the information of 32 programs of 64 systems' operations.Therefore, 32 master routines that server uses just can not be only with 32 interception functions or 64 interception functions if will tackle all information of the server working procedure that adopts 64 systems.
Summary of the invention
Technical matters to be solved by this invention is to provide a kind of method of utilizing 64 information of 32 master routines interceptions in 64 systems, in order to 32 master routines moving in the server that makes 64 systems can intercepting system all information.
To achieve these goals, the invention provides a kind of method of utilizing 64 information of 32 master routine interceptions in 64 systems, its characteristics are that the method includes the steps of:
(1) the dynamic link routine library of tackling function 32 comprise and 64 s' the dynamic link routine library of tackling function that comprises is set;
(2) a plurality of 64 interception function calls modules are set;
(3) these 64 interception functions are set;
(4) by these 32 information of tackling all 32 programs of moving in the intercepting api calls system, and by these 64 information of tackling all 64 programs of moving in the intercepting api calls system;
(5) produce a socket communication service program;
(6) send the information that removes these 32 interception functions and these 64 interception functions; And
(7) these 32 master routines remove these 32 interception functions, remove these 64 interception functions simultaneously.
The above-mentioned method of utilizing 64 information of 32 master routine interceptions in 64 systems, its characteristics are that these 64 interception function setup are after original 32 interception functions.
The above-mentioned method of utilizing 64 information of 32 master routines interception in 64 systems, its characteristics are that these 64 interception functions are comprehensively to tackle function, and it comprises in the dynamic link routine library of tackling function at these 64 and is provided with.
The above-mentioned method of utilizing 64 information of 32 master routine interceptions in 64 systems is characterized in that, these 64 interception function calls modules are background program, are used to be provided with these 64 interception functions.
The above-mentioned method of in 64 systems, utilizing 64 information of 32 master routine interceptions, its characteristics are, described each 64 interception function calls module invokes are somebody's turn to do a plurality of entrance functions in the dynamic link routine library of tackling function, and by this entrance function transmission provide to these 64 the interception function parameters, be provided with these 64 the interception functions.
The above-mentioned method of in 64 systems, utilizing 64 information of 32 master routine interceptions, its characteristics are, also comprise following steps:
When these 32 master routines remove these 32 interception functions, send the information that removes these 64 interception functions by this socket communication service program and tackle the function calls modules to these 64;
Receive the information that removes these 64 interception functions when these 64 interception function calls modules, tackle these entrance functions of function calls module invokes for these 64, remove these 64 interception functions; And
Send the information that these 64 interception functions have removed to these 32 master routines.
Effect of the present invention is that little to existing 32 master routine change amounts, 32 master routines that move change seldom basically, also do not need to recompilate into 64 programs in the system on the server of original employing 32-bit operating system.Originally 32 interception function parts need not be done any action.That is: use existing 32 master routines just can true(-)running in 64 systems that server adopts, and by 64 information of 64 interception intercepting api callses.
Adopt method of the present invention, can be adapted to all relative programs that use interception function mechanism in 64 Windows systems, also can not have influence on the use of this class method in 32 systems simultaneously.
Describe the present invention below in conjunction with the drawings and specific embodiments, but not as a limitation of the invention.
Description of drawings
Fig. 1 is the system block diagrams of 64 Windows systems of the present invention;
Fig. 2 is the method flow diagram of 64 information of interception in 32 master routines of the present invention;
Fig. 3 is the method flow diagram that removes 64 interception functions of the present invention; And
Fig. 4 uses the method flow diagram of 64 interception functions in 32 master routines for the present invention.
Wherein, Reference numeral:
100 32 master routines
220 32 comprise the dynamic link routine library of tackling function
310 64 interception function call modules
320 64 comprise the dynamic link routine library of tackling function
Step 101 is provided with the dynamic link routine library of tackling function 32 comprise and 64 s' the dynamic link routine library of tackling function that comprises
Step 102 is provided with a plurality of 64 interception function calls modules
Step 103 is provided with 64 interception functions
The information of all 32 programs of moving in 32 interceptions of step 104 intercepting api calls system, 64 information of tackling all 64 programs of moving in the intercepting api calls system
Step 105 produces a socket communication service program
Step 106 judges whether to send the information that removes the interception function
32 master routines of step 107 remove 32 interception functions, remove 64 interception functions simultaneously
Step 301 is provided with a plurality of 32 and comprises the dynamic link routine library of tackling function, and 32 interception functions are set, and this interception function is set
Step 302 produces a socket communication service program
Step 303 is provided with a plurality of 64 and comprises the dynamic link routine library of tackling function, and 64 interception functions are set, and this interception function is set
Step 304 is handled 32 interception functions and 64 information that the interception function sends
Step 305 judges whether to send the information that removes 32 interception functions
Step 306 removes 32 interception functions
Step 307 adapter sleeve is connected the telecommunications services program, judges whether to send the information that removes 64 interception functions
Step 308 removes 64 interception functions
Embodiment
Please refer to Fig. 1, represented the system block diagrams of 64 Windows systems of the present invention among the figure, comprise: 32 master routines 100; 32 comprise the dynamic link routine library 220 of tackling function, be provided with or removed by above-mentioned 32 master routines 100, and these 32 comprise 32 information that the dynamic link routine library 220 of tackling function will intercept and are sent to above-mentioned 32 master routines 100; 64 interception function call modules 310 are provided with or are removed by above-mentioned 32 master routines 100, comprise the dynamic link routine library of tackling function in order to be provided with or to remove 64; 64 comprise the dynamic link routine library 320 of tackling function, and 64 information that intercept are sent to above-mentioned 32 master routines 100.
64 interception function call modules 310 are background programs, only play an effect that 64 interception functions are set, need offer the interception function parameters, can parameter be passed to this program by command mode, and program comprises entrance function in the dynamic link routine library 320 of tackling function 64 of run time call thus, so that 64 interception functions are set.
Because the interception function is to be applied to comprehensively, comprehensively tackle function and must be placed in the dynamic link routine library and be provided with, comprise the dynamic link routine library 320 of tackling function so need one 64.64 interception functions, 32 programs interceptions of fundamental sum function on the program is identical, just is compiled into the executive routine on 64 bit platforms.32 interception functions and 64 interception functions are all finished same job, exactly the information of intercepting is sent to 32 master routines 100, handled by the master routine unification, difference is that 64 interception functions can detect 64 information, and 32 interception functions can detect 32 information.
32 original master routines 100 still compile according to 32, and the part of required modification is exactly formerly to call 32 places that comprise the dynamic link routine library 220 of tackle function and increase above-mentioned 64 processes of tackling function call modules 310 that are provided with.In case 64 interception function setup, 64 interception function call modules 310 have not just had concrete meaning.To remove 64 interception functions when in 32 master routines 100, removing 32 interception functions too.
Remove 64 interception functions by socket (socket) communication service program in one embodiment of this invention, please refer to Fig. 3 now, this figure is the method flow diagram that the present invention removes 64 interception functions, as shown in the figure, the method that removes 64 interception functions of the present invention comprises following steps: step 201, the dynamic link routine library of tackling function 64 comprise is set, 64 interception functions are set, and this interception function is set; Step 202 produces a socket communication service program; Step 203 judges whether socket communication service program sends the information that removes 64 interception functions; Step 204 when sending this and remove information, is called interception function program entrance function, removes the interception function, and sends and answer data; If not sending this removes information, then 64 interception functions wait for that always this removes information.
In one embodiment of this invention, 32 master routines 100, its function provides service and gives client, makes the client computing machine at Control Server place fully.Along with the continuous upgrading of various computer hardware softwares and the appearance of 64 bit processors, so Microsoft has also released its 64 bit manipulation system, above-mentioned 32 programs are in order to use on the server of the 64 bit manipulation systems of employing, so use technology of the present invention.
As shown in Figure 2, this figure is the method flow diagram of 64 information of interception in 32 master routines of the present invention, comprises following steps:
Step 101, the dynamic link routine library of tackling function 32 comprise and 64 s' the dynamic link routine library of tackling function that comprises is set, this step is in order to be provided with 64 interception functions, that is: provide a plurality of entrance functions, in order to all information that all 64 programs that a plurality of 64 interception functions move on can interception system are set and unload 64 interception functions, 64 information of intercepting and capturing of interception function can convert the regional extent data that screen will upgrade as required to, send to 32 master routines and handle; Step 102 is provided with a plurality of 64 interception function calls modules, and the command line parameter when at first analytic system is called 64 interception functions obtains the entry address, in order to call the function that 64 interception functions are set; Step 103 is provided with 64 interception functions; Step 104, by 32 information of tackling all 32 programs of moving in the intercepting api calls system, and by 64 information of tackling all 64 programs of moving in the intercepting api calls system; Step 105, produce a socket communication service program, in order to monitor a certain port, in case there is the user to connect, then collect the data that it receives, judge its data content, if the data of making an appointment, illustrate that then 32 master routines need remove the interception function program, then send and remove the interception function information to 32 master routines; Step 106 judges whether to send the information that removes 32 interception functions; Step 107, when sending this and remove information, 32 master routines remove 32 interception functions, remove 64 interception functions, if not sending this removes information, then 32 interception functions wait for that always this removes information and sends.
Because 32 master routines 100 are in needs, be provided with 32 interception functions when having the client to connect, finish 64 interception functions are set after being provided with 32 interception functions exactly, and required command parameter also set, the order line number is the window handle etc. of reception information of 32 master routines 100 of agreement, in case carry out, 64 interception functions just can be started working, and 32 master routines can receive 64 and comprise the information that the dynamic link routine library 320 of tackling function sends.
In client's connection of breaking, perhaps under other some situation, server need remove the interception function, so program has produced a socket communication service program, be used for connecting the server that produces in the interception function operation, information is passed to server, waits for the information of returning from server simultaneously, then just can be removed by official confirmation interception function.
Its process flow diagram as shown in Figure 4, this figure is the method flow diagram that uses 64 interception functions in 32 master routines of the present invention, and comprise: step 301 is provided with a plurality of 32 dynamic link routine libraries of tackling function that comprises, 32 interception functions are set, and this interception function is set; Step 302 produces a socket communication service program; Step 303 is provided with a plurality of 64 dynamic link routine libraries of tackling function that comprises, and 64 interception functions are set, and this interception function is set; Step 304 is handled 32 interception functions and 64 information that the interception function sends; Step 305 judges whether 32 master routines send the information that removes 32 interception functions; Step 306 when sending this and remove information, removes 32 interception functions; If not sending this removes information, then 32 interception functions wait for that always this removes information and sends; Step 307 judges whether socket communication service program sends the information that removes 64 interception functions; Step 308 when sending this and remove information, removes 64 interception functions, if not sending this removes information, then 64 interception functions wait for that always this removes information and sends.
Certainly; the present invention also can have other various embodiments; under the situation that does not deviate from spirit of the present invention and essence thereof; those of ordinary skill in the art can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection domain of claim of the present invention.
Claims (6)
1, a kind of method of utilizing 64 information of 32 master routine interceptions in 64 systems is characterized in that the method includes the steps of:
(1) the dynamic link routine library of tackling function 32 comprise and 64 s' the dynamic link routine library of tackling function that comprises is set;
(2) a plurality of 64 interception function calls modules are set;
(3) these 64 interception functions are set;
(4) by these 32 information of tackling all 32 programs of moving in the intercepting api calls system, and by these 64 information of tackling all 64 programs of moving in the intercepting api calls system;
(5) produce a socket communication service program;
(6) send the information that removes these 32 interception functions and these 64 interception functions; And
(7) these 32 master routines remove these 32 interception functions, remove these 64 interception functions simultaneously.
2, the method for utilizing 64 information of 32 master routine interceptions in 64 systems according to claim 1 is characterized in that, these 64 interception function setup are after original 32 interception functions.
3, the method for utilizing 64 information of 32 master routines interception in 64 systems according to claim 1 is characterized in that, these 64 interception functions are comprehensively to tackle function, and it comprises in the dynamic link routine library of tackling function at these 64 and is provided with.
4, the method for utilizing 64 information of 32 master routine interceptions in 64 systems according to claim 1 is characterized in that, these 64 interception function calls modules are background program, are used to be provided with these 64 interception functions.
5, the method for in 64 systems, utilizing 64 information of 32 master routine interceptions according to claim 4, it is characterized in that, described each 64 interception function calls module invokes are somebody's turn to do a plurality of entrance functions in the dynamic link routine library of tackling function, and by this entrance function transmission provide to these 64 the interception function parameters, be provided with these 64 the interception functions.
6, the method for utilizing 64 information of 32 master routine interceptions in 64 systems according to claim 4 is characterized in that, also comprises following steps:
When these 32 master routines remove these 32 interception functions, send the information that removes these 64 interception functions by this socket communication service program and tackle the function calls modules to these 64;
Receive the information that removes these 64 interception functions when these 64 interception function calls modules, tackle these entrance functions of function calls module invokes for these 64, remove these 64 interception functions; And
Send the information that these 64 interception functions have removed to these 32 master routines.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2005101328940A CN100424638C (en) | 2005-12-27 | 2005-12-27 | Method for catching 64 bit information in 64 bit system by using 32 bit master program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2005101328940A CN100424638C (en) | 2005-12-27 | 2005-12-27 | Method for catching 64 bit information in 64 bit system by using 32 bit master program |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1991745A true CN1991745A (en) | 2007-07-04 |
CN100424638C CN100424638C (en) | 2008-10-08 |
Family
ID=38214022
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2005101328940A Expired - Fee Related CN100424638C (en) | 2005-12-27 | 2005-12-27 | Method for catching 64 bit information in 64 bit system by using 32 bit master program |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100424638C (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102662739A (en) * | 2012-03-23 | 2012-09-12 | 深圳市文鼎创数据科技有限公司 | Method and device for realizing function calling |
CN104951375A (en) * | 2015-07-01 | 2015-09-30 | 北京博睿宏远科技发展有限公司 | Mobile phone APP performance data collecting method based on function interception technology |
CN105446732A (en) * | 2015-05-13 | 2016-03-30 | 北京天诚盛业科技有限公司 | Operation realization method, device and system of 64-bit program |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1293502C (en) * | 1999-06-30 | 2007-01-03 | 倾向探测公司 | Method and apparatus for monitoring traffic in a network |
CN1183452C (en) * | 2000-02-24 | 2005-01-05 | 英业达股份有限公司 | Passive program monitoring method |
US20050027838A1 (en) * | 2003-07-29 | 2005-02-03 | Magid Robert Mark | System and method for intercepting user exit interfaces in IMS programs |
-
2005
- 2005-12-27 CN CNB2005101328940A patent/CN100424638C/en not_active Expired - Fee Related
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102662739A (en) * | 2012-03-23 | 2012-09-12 | 深圳市文鼎创数据科技有限公司 | Method and device for realizing function calling |
CN102662739B (en) * | 2012-03-23 | 2015-04-22 | 深圳市文鼎创数据科技有限公司 | Method and device for realizing function calling |
CN105446732A (en) * | 2015-05-13 | 2016-03-30 | 北京天诚盛业科技有限公司 | Operation realization method, device and system of 64-bit program |
CN104951375A (en) * | 2015-07-01 | 2015-09-30 | 北京博睿宏远科技发展有限公司 | Mobile phone APP performance data collecting method based on function interception technology |
CN104951375B (en) * | 2015-07-01 | 2017-12-08 | 北京博睿宏远数据科技股份有限公司 | Cell phone application performance data acquisition method based on intercepting api callses technology |
Also Published As
Publication number | Publication date |
---|---|
CN100424638C (en) | 2008-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100345415C (en) | Method and apparatus for perfoming boot, maintenance, or install operations on a storage area network | |
CN1791037A (en) | Method for realizing Web service automatic test | |
CN1924863A (en) | Method and system for operating software configured for internet access on a remote computer | |
CN1881174A (en) | Computer switch and a computer switching method | |
CN1780299A (en) | System and method for remotely controlling a debugging unit | |
CN1842073A (en) | Method for realizing external device mapping of network computer | |
CN1943160A (en) | System for invoking a privileged function in a device | |
CN1784056A (en) | Short message service (SMS) remote control system and method of mobile communication terminal | |
CN101051941A (en) | Process upgrading method and system | |
CN1494022A (en) | Method accessing data bank through protocol agency mode | |
CN1889026A (en) | KVM switching system and its mouse synchronizing method | |
CN1577277A (en) | Managing program applications | |
CN1991745A (en) | Method for catching 64 bit information in 64 bit system by using 32 bit master program | |
CN1750667A (en) | Method for obtaining updating power information of mobile terminal | |
CN101035025A (en) | Network device management method and system | |
CN101052194A (en) | Device for realizing maintenance of far end radio frequency terminal by local maintenance terminal | |
CN1553332A (en) | Facility centralizing management method based by plugging technology | |
CN1889462A (en) | Method and system for realizing network management and network element configuration operation | |
CN1303054A (en) | Virtual network device and its communication method | |
CN101060462A (en) | A data recovery method, device, storage server and DHCP server | |
CN1901724A (en) | Dispatching method for mobile communication system software version updating | |
CN102148869A (en) | Method and device for JAVA application to transfer information to local | |
CN1251079C (en) | Method for realizing data interaction between different systems | |
CN1946035A (en) | Method for managing net element data configuration and net element | |
CN1270251C (en) | Method for realizing interrupt request preprocessing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20191031 Address after: East area, 8th floor, No.19, Lane 299, Guanghua Road, Ningbo national high tech Zone, Ningbo City, Zhejiang Province Patentee after: Ningbo cas message technology applied research institute Address before: Taipei City, Taiwan, China Patentee before: Yingda Co., Ltd. |
|
TR01 | Transfer of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20081008 Termination date: 20191227 |
|
CF01 | Termination of patent right due to non-payment of annual fee |