TW480439B - Method for examining correctness of system operation - Google Patents

Method for examining correctness of system operation Download PDF

Info

Publication number
TW480439B
TW480439B TW87121092A TW87121092A TW480439B TW 480439 B TW480439 B TW 480439B TW 87121092 A TW87121092 A TW 87121092A TW 87121092 A TW87121092 A TW 87121092A TW 480439 B TW480439 B TW 480439B
Authority
TW
Taiwan
Prior art keywords
program
correctness
application
file
item
Prior art date
Application number
TW87121092A
Other languages
Chinese (zh)
Inventor
Peng Li
Shiuan-Tung Chen
Guang-Shin Lin
Original Assignee
Inventec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Corp filed Critical Inventec Corp
Priority to TW87121092A priority Critical patent/TW480439B/en
Application granted granted Critical
Publication of TW480439B publication Critical patent/TW480439B/en

Links

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

A kind of method for examining correctness of system operation is disclosed in the present invention. At first, the original data of one program to be tested is read and an executable set is established according to the original data. Then, the operation correctness of the program to be tested is analyzed according to the executable set, in which an error report is generated if an operation error is known. The steps for establishing the executable set are described in the following. At first, the file system of the program to be tested is scanned and a database is then established according to the scanned results. The database includes the following information such as dynamic linking library directly used by the program to be tested, dynamic linking library that is indirectly used by the program to be tested, and the files used redundantly. After that, based on file information, the required executable file of program to be tested is selected. Finally, a corresponding structure table is generated according to the selected file, and the executable set composed of the corresponding structure table is formed.

Description

種李明係有關於電腦系統檢測技術,特別是有· 裡系為運行正確性的檢測方法。仅们·符別疋有關於一 系統程式以及在其作卢 失敗,除了邏輯性錯誤之:衣:下操作之應用程式若運行 或應用程式運行所需的卜姑:要原因在於構成系統程式 蓋。隨著Windows等大型、作章失、知壞、亦或是被錯誤覆 運行所需的資源亦趨於^# Μ的普遍使用,應用程式 或是被錯誤覆蓋,用;^ ^發生貧源軼失、損壞、 習知較常採用的方十…、曉運行失敗的原因。 運行失敗之時,僅僅是&所=當系統程式或應用程式發生 就Τ複製。如此-來, (一 透::”丄程式建立, 故僅能簡單地可;,案等資料匯集而成, 料的軼失。再Ϊ Ξ目;:二將導致原有應用程式相關資 料的簡單堆積,各資料:::2的模板庫,’只是資 ^ M .a . ^ 貝卄之間亚沒有建立時間上或空間上的 出比’、:、η’對於某些特殊檔案中的資源,則無法做 ,r ^ 就疋無法自動追加檔案分析的類型。另外,習 H i不能具體分析發生錯誤的檔案,判斷過程中準確 =無法針對個別檔案進行錯誤修正。此外,由:;; itΐΐϊ與當前系統程式的動態鏈接庫密切相關,因此 無法支援跨平台檢測。 w此This Li Ming system is about computer system detection technology, especially there is a detection method for running accuracy. Only Men Fubei have something about a system program and its failure to make it, except for the logical errors: clothing: if the application to be run or the application is required to run: the reason is to form the system program cover . With Windows and other large, misunderstood, misunderstood, or resources that are required to run incorrectly, they tend to be widely used, and applications may be overwritten and used by mistakes. Loss, damage, and the more commonly used Fang Shi ..., the reasons for failure. When the operation fails, it is just & so = when the system program or application occurs, it is copied. So-come, (One through :: "The program is created, so it can only be easily collected; the case and other data are collected, and the data is unintelligible. Then again, the project; and the second will lead to the original application-related data. Simple stacking, each data ::: 2 template library, 'Just the asset ^ M.a. ^ There is no time or space ratio between 卄 and 、' for some special files. Resources, you ca n’t do it, you ca n’t automatically add the type of file analysis. In addition, Xi ca n’t analyze the files that have errors in detail, and the accuracy of the judgment process ca n’t be corrected for individual files. In addition, by: ;; itΐΐϊ is closely related to the dynamic link library of the current system program, so it cannot support cross-platform detection. wthis

五、發明說明(2) 因此,本發明之— 〜"" 性的檢測方、、扣 目的,在於提供一種备“ 丨扪饱利方去,係利用 檀系統運行正 確運行。 仃集檢測系統及應用# 4 Αμ ⑺長式能否正 本發明之另一目 檢測方法,藉由一人,在於提供一種系統運行 及應用程式的錯誤判_。 卓"面,可跨平台支援系統- 本發明之再一目 檢測方法,能具體分析出種系統運行正媒性的 錯誤之檔案加以修正, 、曰决的檔案,並可針對發生 為能獲致上述目的準確性高、且具有即時性。 正確性的檢測方法來完本卷明可藉由提供一種系統運行 始資料,並根據此原=㊁,,讀取某一待測程式之原 行集分析待測程式之貝科建立一可行集。接著,根據可 生一錯誤報告。至於建=f,性,若知運行有錯誤,則產 之檔案系統進行掃描,、,可行集之步驟,係先對待測程式 括待測程式直接調用之^ f以建立一數據庫,此數據庫包 庫、以及冗餘讁用檔案恶鍵接庫、間接調用的動態鏈接 取待測程式可行及^需等^訊4。然後,根據檔案訊息選 生一對應結構表,而^ 樓案 最後’根據經選取播案產 达#丄 由野應結構表细ώ可—隹 為讓本發明之上述和直 、、、成了彳丁集。 顯易懂,下文特舉一較# ς t 的、特徵、和優點能更明 細說明如下·· 貝施例,並配合所附圖式,作詳 圖示之簡單說明·· 第1圖所示為根據本發明# x a逯立可行集之一例的流程 C:\ProgramFiles\Patent\0549-4201-E.ptd第 5 頁 480439 五、發明說明(3) 圖; 第2圖所示為根據本發明 — 、 庫結構的示意圖; 一 ^用粒式所對應之數據 第3圖所示可行集内與應 資源的結構表示意圖;。王式正確運行相關之某一 第4圖所示為根據本發明八 -第5圖為根據本發明檢测方: = 以及 示。 車乂佳貝私例之流程圖 符號說明: 20〜特徵描述攔位;21〜直 攔位;23〜冗餘調用攔位;3G〜槽案=位,^間接調用 32-核對和;33〜循環冗餘 ,、冉,31〜檔案大小; 4〇、41、42、43解^哭餘H ; 34〜PE標案格式版本,· 及,.分析Λ 4〜集合解譯公用介面以;以 實施例: 由於應用程式運行失目令县甘, 損,因此,芸& η士& \取基本的原因在於資源的缺 貝 口此右月匕即4地分析出造忐鋁彳、笞ν一必l 並且能夠即時地予以彌補,匕彳 :李:Γ康ί發明檢測方法分析並恢復系統及應用程式二 使糸統回復正常運行的能力。 ^而 =先’根據系統程式的原理建立相關的數學模型(詳 之可行性分析模型)。在系統程式的作業環境之 :亩2用程式若能亡常運行’其最基本的前提是該應用程 》 調用的各種貝源暨系統程式所提供的基本資源的狀 C.\Prograni Files\Patent\0549-4201-E.ptd第 6 頁 480439V. Description of the invention (2) Therefore, the purpose of the present invention is to provide a “ready party” that uses the sandalwood system to run correctly. 仃 Set detection System and Application # 4 Αμ ⑺Long-term can be another method of detecting the present invention, by one person, is to provide a system operation and application error judgment_. Zhuo " face, cross-platform support system-the present invention Another one-shot detection method can specifically analyze the files that are correct for the median errors of the system operation, and correct the files, and can be targeted for the occurrence of the above-mentioned purposes with high accuracy and instantaneousness. The method can be completed by providing a system operation starting data, and based on the original = 读取, read the original row set of a program under test to analyze the Beco of the program under test to establish a feasible set. Then, according to An error report can be generated. As for build = f, if the operation is known to be wrong, the file system will be scanned. The steps of feasibility set are based on the program to be tested, including the program to be tested directly. Use ^ f to create a database, this database package library, and redundant use of file bad key connection library, indirect call dynamic link feasibility and need to wait for the program under test 4. Then, select the students according to the file information. There is a corresponding structure table, and ^ the last case of the building case is based on the selected broadcast case production up to # ώ 由 野 应 structure table can be used for free-隹 In order to make the above-mentioned and direct, the, and the present invention into a small set. The following gives a more detailed description of the features, characteristics, and advantages of # ς t as follows: Bezier examples, combined with the accompanying drawings, make a simple description of the detailed illustrations. Invention # xa 逯 立 可行 可 集集 的 例 C: \ ProgramFiles \ Patent \ 0549-4201-E.ptd page 5 480439 V. Description of the invention (3) Figure; Figure 2 shows the library according to the present invention, Schematic diagram of the structure; ^ The data corresponding to the granular form is shown in Fig. 3, which is the structure table of the corresponding resources in the feasible set. Schematic diagram related to the correct operation of the king style. Figure 5 shows the detection side according to the present invention: = and shown. No. Description: 20 ~ characteristic description stop; 21 ~ straight stop; 23 ~ redundant call stop; 3G ~ slot case = bit, ^ indirect call 32-check and sum; 33 ~ cyclic redundancy, Ran, 31 ~ File size; 40, 41, 42, 43 solutions ^ waiyu H; 34 ~ PE standard format version, and analysis of Λ 4 ~ set interpretation common interface; Example: blindness due to application running Lingxian Gan, damage, therefore, Yun & η 士 & \ The basic reason is the lack of resources. The analysis of the aluminum alloy, aluminum alloy and aluminum alloy can be done immediately. Make up, dagger: Li: Γ Kangί invented the detection method to analyze and restore the system and the ability of the application to restore the system to normal operation. ^ And = first ’Establish related mathematical models (detailed feasibility analysis models) based on the principles of system programs. In the operating environment of the system program: If the application program of Mu 2 can run normally, its most basic premise is the status of the basic resources provided by the various source programs and system programs called by the application. C. \ Prograni Files \ Patent \ 0549-4201-E.ptd page 6 480439

態均屬正常。因此,根據本發明方法,提出可行集 (enable set)做為判斷依據。所謂可行集是指某'一應 耘式在其所屬系統程式上執行時所需資源之總和;若“以 統之觀點言,可行集之概念即為系統程式正常運行所需資 源之總和。 、 在不同系統程式環境下,可執行時的狀態參數並不棄 相同,為方便說明起見,下文係以Wind〇ws95系統程式之^ 作業環境為例,說明建立一應用程式之可行集的過程。 請參照第1圖,所示為根據本發明建立可行集的流程 圖示。第1圖中,首先係於步驟10開始對待測應用程式所 屬檔案系統進行掃描,獲取包括應用程式名稱、大小、 檔案格式版本等檔案特徵,並且包括該應用程式運行 接調用的動態鏈接庫(DLL: Dynamic Linking Library)檔 案、間接調用的動態鏈接庫檔案、以及與待測應用程式i 接相關之冗餘調用檔案(諸如延伸檔名 為· hlp、· txt.....· dat、· dbf等之檔案)的詳細訊自, 而於步驟11,建立此待測應用程式之相關數據庫,此〜 庫之結構即如第2圖所示, 第2圖所示即為根據本發明某一應用程式所對應之數 據庫結構的示意圖。圖示中,應用程式之數據庫結構包 括:特徵描述欄位20、直接調用欄位21、間接調用攔= 22、以及冗餘調用欄位23等四者。其中,特徵描述攔位“ 記錄著關於該應用程式之名稱、大小、PE檔案格式版本等 之描述;直接調用欄位2 1記錄著與系統程式相關、直接調The state is normal. Therefore, according to the method of the present invention, an enable set is proposed as a judgment basis. The so-called feasible set refers to the sum of the resources required for a 'one-to-one' type to execute on its own system program; if "in a unified perspective, the concept of a feasible set is the sum of the resources required for the normal operation of the system program." Under different system program environments, the state parameters during execution are not the same. For the sake of convenience, the following uses the operating environment of the Windows 95 system program as an example to explain the process of establishing a feasible set of an application program. Please refer to FIG. 1, which shows a flowchart of establishing a feasible set according to the present invention. In FIG. 1, first, at step 10, scanning is performed on the file system to which the application under test belongs to obtain the application name, size, and file. File version and other file features, and includes dynamic link library (DLL: Dynamic Linking Library) files that the application runs and calls, dynamic link library files that are called indirectly, and redundant call files that are related to the application under test ( Such as extension files named hlp, txt, ..., dat, dbf, etc.), and in step 11, create this test application. Using a program-related database, the structure of this library is shown in Figure 2. Figure 2 is a schematic diagram of the database structure corresponding to an application according to the present invention. In the figure, the database structure of the application Including: feature description field 20, direct call field 21, indirect call field = 22, and redundant call field 23, etc. Among them, the feature description field "records the name, size, PE of the application Description of file format version, etc .; direct call field 2 1 records related to system program, direct adjustment

五、發明說明(5) 一 態鏈接庫(.dll),係 間接調用攔位22記錄著盘:用”:::疋息, 鏈接庫(.dll),係屬;:^、、先%式相關、間接调用的動態 用攔位23則記錄著i系二::檔案的詳細訊息;而冗餘調 之冗餘調用檔案,諸如延;檔名而與該應用程式直接相關 為· hlP、. txt...... dat、、, 接基 ^ ^ ^ ^專槽案。 自Ϊ 第1圖’進行步驟12從數據庫獲取- 案屬於待測應用程式可執=工息:::;相檔 測應用程式可行集所需之Μ斤而者。右於步驟13知屬待 案訊息對所對應^於索s案,則進行步驟14根據此一檔 於步驟1 5^虽案,自檔案系統中進行提取。然後, 3巴所:檔案進行檔案格式之分析,獲取如同第 d圖所不之結構表。 刀1丨 J示 請參照第3圖,所千& &成m ^ ^ ^ ^ ^ Λ斤為與應用程式正確運行某一相關 枯案(或%貧源)的結構表示意 包括檔案名穩(file nam6〇 弟3圖中母、、、°構表 Ή ame) 30、檔案大小(file size) red二 ieek·) 32、循環冗餘㈣碼(cyclic nd= checkc〇de) 33、pE 檔案格式版本(pE We ers ion) 34等攔位,每一欄位均 特徵描述。 马某相關播案(貝源)之 再凊參照第1圖,接著谁^ 掃描是否完畢,若否,則進/牛步驟16判斷對檔案系統之 後,回復至步驟12。再上,::驟17指向下-筆檔案訊息 ^ ^ 丹考在步驟1 3判斷若知非屬锌:目,丨;^ 用程式可行及所需的數據結構 :右夫非屬待測應 亦進订步驟1 6做掃描完畢V. Description of the invention (5) A state link library (.dll), which indirectly calls the stop 22 to record the disk: "" :: information, the link library (.dll), belongs to; ^ ,, first% Dynamically related, indirect call, dynamic stop 23 records i series 2: detailed information of the file; redundant call files such as extension; and the file name directly related to the application is hlP, .txt ...... dat ,,,, and connect to the base case ^ ^ ^ ^ Special case. Since the first picture 'Go to step 12 to obtain from the database-the case belongs to the application under test can be executed = work interest :::; The phase file test application requires the necessary set of M. The right is known in step 13 as the corresponding message pair corresponding to the case s, then step 14 is based on this file in step 1 5 ^ Although the case, since Extraction in the file system. Then, the 3 bus station: The file is analyzed in the file format to obtain the structure table as shown in Figure d. For the knife 1 丨 J, please refer to Figure 3, So Qian & & Cheng m ^ ^ ^ ^ ^ ^ The structure of a dry case (or% poor source) related to the correct operation of the application means that the file name is stable (file nam6〇 弟 3 Chinese, Chinese ,, and ° structure table me ame) 30, file size (red size, ieek ·) 32, cyclic redundancy code (cyclic nd = checkc〇de) 33, pE file format version (pE We ers ion ) 34 stops, and each field is characterized. Refer to Figure 1 for the relevant broadcast case (Bai Yuan) of Ma, then ^ Whether the scan is complete, if not, go to step 16 to determine the file. After the system, return to step 12. Then, step 17: point down-file information ^ ^ Dan Kao judged in step 13 if it is not zinc: heading, 丨; ^ program feasible and required data structure : Right husband is not under test and should also be ordered in step 16

480439 五、發明說明(6) 與否的判冑。當於步驟1 6判斷知掃描已完畢,則將所 之若干結構表瑭接〜 ^ 則將所獲致 偁表建構侍一可仃集(步驟48)。換言 ^ 應用程式運行相關檔案(或稱相關 2 ^ 構表所組成。當然,尚有其他建立可行集的方;對當” 僅為此中之一例。 J乃式,第1圖 再者,請參照第4圖,所示為根據本發明之 5 Ϊ圖2據本發明,由不同平台作業環境下所建立:可 仃集,一可为別經由各自的系統集合解譯器處理,譬如,# 4圖所不’各種系統程式如Windows 95、Unix、Linux、弟480439 V. Explanation of invention (6) When it is judged in step 16 that the scanning is completed, then a number of the structural tables are connected to each other, and the obtained table construction is performed (step 48). In other words, ^ application-related files (or related 2 ^ structured tables. Of course, there are other ways to set up a feasible set; Dangdang) is just one example of this. J Naoshi, Figure 1 and then, please Referring to FIG. 4, there is shown 5 according to the present invention Ϊ FIG. 2 According to the present invention, it is established under different platform operating environments: it can be aggregated, and one can be processed by its own system set interpreter, for example, # 4 Figures are not 'Various system programs such as Windows 95, Unix, Linux, Brother

MacOS等經由各自的解譯器4〇、41、42、43,並透過插 (plug-in)方式與一集合解譯公用介面44連接後, 模組45做檢測。換言《,本發明之檢測方法可以刀斤 系統程式及其環境中運行的應用程式是否正確。由於八^ 方法是以集合形式為之,然而集合解譯則與系統程式:斤 關。 … 請參照第5圖,所示為根據本發明之檢測方法一 實施例的流程圖。首先,於步驟5〇讀取系統或應用又 原始資料,此原始資料是應用程式運行所建立之模^的 再於步驟51根據是項原始資料建立當前可行集(詳如^罔 所示)。接著,進行步驟52分析當前系統或應用程式曰 確性,此分析方法係利用可行性分析模型(詳如下述 判斷。再於步驟53判斷系統或應用程式的運行是否正進订 若屬正確,則進行步驟54判斷是否進行下一次=析,,。 是,則回復至步驟5 0 ;若否,則完成此一流程。 右MacOS and the like are connected to a collective interpretation public interface 44 through a plug-in method through respective interpreters 40, 41, 42, 43 and a module 45 performs detection. In other words, the detection method of the present invention can determine whether the system program and the application program running in the environment are correct. Because the ^^ method is in the form of a set, the set interpretation is related to the system program: Jin. … Please refer to FIG. 5, which shows a flowchart of an embodiment of the detection method according to the present invention. First, read the system or application's original data in step 50. This original data is a model created by the application running. Then, in step 51, the current feasible set is established based on the original data (see ^ 罔 for details). Next, go to step 52 to analyze the current system or application's accuracy. This analysis method uses a feasibility analysis model (see the following judgment for details. Then, step 53 to determine whether the system or application is running correctly. If the order is correct, perform Step 54 determines whether to perform the next analysis, if yes, then return to step 50; if not, complete this process. Right

480439 五、發明說明(7) 若在步驟53知道系統或應用 , 驟55產生分析錯誤報告,並可於步^行出錯,則進行步 修正(詳如下述)。㈣,於步驟54^,對錯誤槽案進ί 析。 j斷弋否進行下—次分 【可行性分析模型】 由於本發明之檢測方法,係 因此,當用戶需要測試系統程式的=集^形式進行分析。 c! T H?l(Sc) f ^# ^ ^ ^ ^ ίί 、std 當二V a 為與系統程式相關測試及與應 ::二㊁而區分 系統相關測試t,係檢給W處關測试兩類。就與 ;係檢驗當珂應用程式(Αε )與當前系統程480439 V. Description of the invention (7) If the system or application is known in step 53, step 55 generates an analysis error report, and if an error occurs in step ^, step correction is performed (see details below). Alas, in step 54 ^, analyze the error slot case. j Broken down whether to perform the next-time analysis [Feasibility Analysis Model] Due to the detection method of the present invention, when the user needs to test the system program in the form of = set ^ for analysis. c! TH? l (Sc) f ^ # ^ ^ ^ ^ ίί, std When the second V a is a test related to the system program and the response: the second test is distinguished from the system related test t, which is checked to the W department test Two categories. And; check the current application program (Αε) with the current system program

式(C)的父集疋否包含於標準系統程式(U。假若A 當前應用程式(Αε,即應用程式間接可行 ^ /.動悲鏈接庫與當前系統程式(sc)相關的動態 系統程式中的原始記錄集合(A_inai)相互比較。若前者包 含2後者’則表示運行後或運行中的應用程式未發生超出 正常範圍的變化,即可認定該應用程式正常;否則,則視 、正吊反之’則表示系統程式出錯。就與應用程式 相關測試言’當運行一段時間的應用程式,其相關記錄集 口( Ac ’即當4可行集)可能會發生變化,需與應用程式在Is the parent set of formula (C) not included in the standard system program (U. If A is the current application program (Αε, the application program is indirectly feasible) /. The dynamic link library and the dynamic system program related to the current system program (sc) The original record set (A_inai) is compared with each other. If the former contains 2 and the latter, it means that the application is normal after running or running, and the application is considered normal; otherwise, the application is considered to be the other way around. 'It means that the system program has an error. It is related to the application test.' When an application is running for a period of time, its related record collection port (Ac 'that is when the 4 feasible set) may change.

昏始玄?,絲隹人/ A \ 一杜各4·, A 為該應用程式出錯。 【錯誤修正Faint? , 隹 隹 人 / A \ one du each 4 ·, A is an error for this application. [Bug fixes

III _ C:\Program Files\Patent\0549-4201-E.ptd第 10 頁 。、座過上述可行性分析後,柃、 t誤之後’將發生錯誤的記錄r,出系統程式或應用程式 從原始資料中自動找出正確的^ 2為錯誤分析報告,並可 ,。士是,可針對發生錯誤的個,L據以替換掉錯誤的記 若欲貫現個別性的錯誤修復,前j槽案進行修正。然而, 備份,並將必要的資訊存入數^ ^當需先為應用程式進行 時,即可從預先備份者進行相=中。當用戶選擇修復 取出來,進行修復。 ㈣用,將欲修復的資源提 【實例】 為了具體說明本發明之檢測 一說明 々忐,炫以Winzip為例做 首先’掃描Winzip檔案 應用程式名稱、大小、pE檔 該應用程式運行時直接調用 悲鏈接庫、以及冗餘調用檔 的相關數據庫。 系統的相關訊息,其中,包括 案格式版本等特徵描述,以及 的動態鏈接庫、間接調用的動 案等之詳細信息,建立Winzip 從該數據庫中獲取檔案訊息,對與W i nz i p相關之可行 及所需的檔案進行分析,獲取相對應之結構表,據以構成 可行集’即如下表所示。III _ C: \ Program Files \ Patent \ 0549-4201-E.ptd page 10. After the above feasibility analysis, after 柃, t is wrong, erroneous record r will occur, and the system program or application program will automatically find the correct ^ 2 from the original data for the error analysis report, and can. In fact, you can replace the error records with the errors that occurred. If you want to implement individual error repairs, the former j case will be amended. However, back up and save the necessary information into the data ^ ^ When you need to do it for the application first, you can do it from the backup person. When the user selects repair, remove it and repair it. For example, in order to specifically explain the detection of the present invention, I will use Winzip as an example to first 'scan the Winzip file application name, size, pE file. This application is called directly when the application is running. Sad link library, and related database of redundant call files. Relevant information of the system, including detailed descriptions such as file format versions, as well as detailed information such as dynamic link libraries, indirect action files, etc. Establish Winzip to obtain file information from this database, which is feasible for W inz ip related And the required files are analyzed to obtain the corresponding structure table, which constitutes a feasible set ', as shown in the following table.

C:\Program Files\Patent\0549-4201-E. ptd第 11 頁 480439 五、發明說明(9) 檔案 性質 License.txt 冗餘集 Order.txt 冗餘集 Readme.txt 冗餘集 Vendor.txt 冗餘集 Whatsnew.txt 冗餘集 Winzip.cnt Help冗餘集 Winzip.id Help冗餘集 Winzip.hip Help冗餘集 Winzip.txt 冗餘集 Winzip32.exe 可教行程式 Winzipfm.dll 直接動態鏈接庫 We.com 間接動態鏈接庫 We32.dll 直接動態鏈接庫 Wefm32.dll 間接動態鏈接庫 Wesepe32.exe 間接動態鏈接庫 Weshlext.dll 間接動態鐽接庫 Wetutor.help Help冗餘集 Wewizard.gid Help冗餘集 Wewizard.help Hdp冗餘集 然後,讀取該應用程式預先備份好的原始資料,與可 行集進行比較,分析當前系統程式或該應用程式運行之正 確性,若有不正確的狀態記錄,則產生純文字檔之錯誤報 告,即如下示。C: \ Program Files \ Patent \ 0549-4201-E. Ptd page 11 480439 V. Description of the invention (9) File nature License.txt Redundant Order.txt Redundant Set Readme.txt Redundant Set Vendor.txt Redundant I set Whatsnew.txt Redundant set Winzip.cnt Help Redundant set Winzip.id Help Redundant set Winzip.hip Help Redundant set Winzip.txt Redundant set Winzip32.exe Teach-through Winzipfm.dll Direct dynamic link library We .com Indirect dynamic link library We32.dll Direct dynamic link library Wefm32.dll Indirect dynamic link library Wesepe32.exe Indirect dynamic link library Weshlext.dll Indirect dynamic link library Wetutor.help Help Redundant set Wewizard.gid Help Redundant set Wewizard .help Hdp Redundant Set Then read the pre-backed-up original data of the application, compare it with the feasible set, analyze the correctness of the current system program or the operation of the application, and if there is an incorrect status record, a pure The error report of the text file is shown below.

WinZip 6.0WinZip 6.0

C:\Program Files\Patent\0549-4201-E.ptd第 12 頁 480439 五、發明說明(ίο) WINZIPFM· DLL ^Different version—Malfunction WZ.COM = Different file size—Malfunction W Z 3 2. DLL — Different version Fail RunningC: \ Program Files \ Patent \ 0549-4201-E.ptd page 12 480439 V. Description of the invention (ίο) WINZIPFM · DLL ^ Different version—Malfunction WZ.COM = Different file size—Malfunction WZ 3 2. DLL — Different version Fail Running

WINZIP.HLP=Different CRC code—NO HELPWINZIP.HLP = Different CRC code—NO HELP

Function 關於修正錯誤的方法,譬如上例錯誤報告中 WINZIP· HLP不能正常開啟,是因為CRC c〇DE錯誤故可將 預先備份妥當之樓案正確部份寫入當前檔案内,回復析 案的正常運行。 曰 雖然本發明已以較佳實施 限定本發明,任何熟習此技藝 和範圍内,當可作更動與潤飾 視後附之申請專利範圍所界定 例揭露如上,然其並非用以 者在不脫離本發明之精神 ,因此本發明之保護範圍當 者為準。 $Function Regarding the method of correcting the error, for example, the WINZIP · HLP cannot be opened normally in the error report above, because the CRC code error is wrong, so the correct part of the pre-backed up building case can be written into the current file to restore the normal analysis of the case. run. Although the present invention has been limited to the present invention by a better implementation, anyone familiar with this technique and scope can make changes and retouch the examples defined in the scope of the patent application attached as above, but it is not intended to be used without departing from the present invention. The spirit of the invention, therefore, the scope of protection of the present invention shall prevail. $

Claims (1)

480439480439 1 · 一種系統運行正確性沾认丨 / Λ ^ ^ ^ ^ -V 〖生的檢測方法,包括下列步驟: (a)頊取一私式之原始資料; w (b )根據該原始資料建立一可行集· (c) 根據該可行集分析哕浐彳夕=^ ll n β私式之運行正確性·, (d) 若於步驟(c)知運行右 .^ ^ ^ 丁有錯^ ’則產生一錯誤報告。 2.如m範圍第1項所述之系統運行正確性的檢 測方法,其中,步驟(b)包括: 60^ 掃描該程式之槽幸糸& … I WV、古Γ 統,並據以建立-數據庫,該數 據庫包括該程式直接調用夕I A M u ^ 、η ~ Κ 之動態鏈接庫、間接調用的動熊 鍵接庫、以及几餘調用標案等之訊I、· <w 根據该專檐案訊息,選而# 二 ^ 遠取泫程式可行及所需之檔案; 根據母一該經選取槽案漆座一斜座 /、 v、屋生 對應、、、rr構表’而由該箸 對應結構表組成該可行集。 寻 3·如申請專,範圍第2項所述之系統運行正確性的檢 測方法,其中,每一該對應結構表包括··檔案名稱、檔案 大小、核對和、循環冗餘檢測碼、PE檔案格式版本等攔 位0 4 ·如申請專利範圍第2項所述之系統運行正確性的檢 測方法’其中’選取該程式可行及所需之檔案的步驟係自 該檔案系統中進行提取。 ” 5 ·如申請專利範圍第1項所述之系統運行正確性的檢 測方法,其中,該程式是系統释式。 6 ·如申請專利範圍第5項所述之系統運行正確性的檢 測方法,其中,步驟(b)係判斷當前之該系統程式需包含1 · A correctness of system operation 丨 / Λ ^ ^ ^ ^ -V 〖Health detection method, including the following steps: (a) grab a private original data; w (b) establish a Feasible set · (c) Analyze the correctness of the operation of the private type according to the feasible set = ^ ll n β private operation, (d) If you know the right operation in step (c). ^ ^ ^ 丁 有 错 ^ 'Then Generate an error report. 2. The method for detecting the correctness of the system operation as described in item 1 of the m range, wherein step (b) includes: 60 ^ Scanning the slot of the program 糸 I I WV, ancient system, and based on it -Database, which includes the program directly calling the IAM u ^, η ~ Κ dynamic link library, indirect calling dynamic bear key connection library, and several more calls to the project, etc. I, · < w According to the special Eaves case information, choose # 2 ^ far to get the program feasible and required files; according to the mother should choose the trough case paint seat a slant seat /, v, housing correspondence ,,, rr structure table '箸 The corresponding structure table composes this feasible set. Finding 3. The method for detecting the correctness of the system operation as described in the second item of the application, where each corresponding structure table includes: file name, file size, checksum, cyclic redundancy check code, PE file Blocks such as format version 0 4 · The method for detecting the correctness of system operation as described in item 2 of the scope of the patent application, 'wherein' the steps of selecting the feasible and required files of the program are extracted from the file system. "5 · The method for detecting the correctness of system operation as described in item 1 of the scope of patent application, wherein the program is a system interpretation. 6 · The method for detecting the correctness of system operation as described in item 5 of the scope of patent application, Among them, step (b) judges that the current system program needs to include 480439 六、申請專利範圍 於待檢測系統程式的標準格式。 7. 如申請專利範圍第1項所述之系統運行正確性的檢 測方法,其中,該程式是應用程式,該應用程式係於一系 統程式之作業環境下操作。 8. 如申請專利範圍第7項所述之系統運行正確性的檢 測方法,其中,步驟(b )包括: 檢驗當前該應用程式與當前系統程式的交集是否包含 於標準系統程式;以及 運行後之該應用程式相關記錄集合是否包含於該應用 程式在該系統程式中的原始記錄集合。 9. 如申請專利範圍第1項所述之系統運行正確性的檢 測方法,尚包括步驟(e )根據該錯誤報告逐一修正。480439 VI. The scope of patent application The standard format of the system program to be tested. 7. The method for detecting the correctness of system operation as described in item 1 of the scope of patent application, wherein the program is an application program and the application program operates under the operating environment of a system program. 8. The method for detecting the correctness of system operation as described in item 7 of the scope of patent application, wherein step (b) includes: checking whether the intersection of the current application program and the current system program is included in the standard system program; and Whether the application-related record collection is included in the application's original record collection in the system program. 9. The method for detecting the correctness of system operation as described in item 1 of the scope of the patent application, further comprising step (e) of correcting one by one according to the error report. C:\ProgramFiles\Patent\0549-4201-E.ptd第 15 頁C: \ ProgramFiles \ Patent \ 0549-4201-E.ptd page 15
TW87121092A 1998-12-17 1998-12-17 Method for examining correctness of system operation TW480439B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW87121092A TW480439B (en) 1998-12-17 1998-12-17 Method for examining correctness of system operation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW87121092A TW480439B (en) 1998-12-17 1998-12-17 Method for examining correctness of system operation

Publications (1)

Publication Number Publication Date
TW480439B true TW480439B (en) 2002-03-21

Family

ID=21632343

Family Applications (1)

Application Number Title Priority Date Filing Date
TW87121092A TW480439B (en) 1998-12-17 1998-12-17 Method for examining correctness of system operation

Country Status (1)

Country Link
TW (1) TW480439B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI675310B (en) * 2016-10-11 2019-10-21 香港商阿里巴巴集團服務有限公司 Method and device for preventing repackaging

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI675310B (en) * 2016-10-11 2019-10-21 香港商阿里巴巴集團服務有限公司 Method and device for preventing repackaging
US10685117B2 (en) 2016-10-11 2020-06-16 Alibaba Group Holding Limited Method and apparatus for anti-repackaging

Similar Documents

Publication Publication Date Title
CN110162977B (en) Android vehicle-mounted terminal system vulnerability detection system and method
WO2020000706A1 (en) Database comparison-based interface testing method and system, device and storage medium
US7647584B2 (en) Automation and isolation of software component testing
US9465725B2 (en) Software defect reporting
US7673292B2 (en) Auto conversion of tests between different functional testing tools
CN102736978B (en) A kind of method and device detecting the installment state of application program
WO2017124808A1 (en) Fault information reproduction method and reproduction apparatus
US7054881B2 (en) Method and system for reporting standardized and verified data
US7093162B2 (en) Persistent stateful component-based applications via automatic recovery
CN106951345B (en) Consistency test method and device for disk data of virtual machine
CN106940695B (en) Data source information verification method and device
US20100306486A1 (en) Policy-based application aware storage array snapshot backup and restore technique
US20060047626A1 (en) Generating an optimized restore plan
US8448138B2 (en) Recording user-driven events within a computing system
CN109977008B (en) Method and terminal for making JS code depended on by application program compatible with native library
Murphy Automating Software Failure Reporting: We can only fix those bugs we know about.
WO2021129335A1 (en) Operation monitoring method and apparatus, operation analysis method and apparatus
CN113127108A (en) Service request processing method and device, storage medium and electronic equipment
CN115248700A (en) Method and system for automatically constructing mobile installation package by product code
TW480439B (en) Method for examining correctness of system operation
CN113656301A (en) Interface testing method, device, equipment and storage medium
CN111552595A (en) Database backup and recovery method, device and equipment
CN111176720A (en) Control method and control device for running application programs in multiple systems
WO2016201997A1 (en) Automatic testing method, device and system
CN114968644A (en) System software dump method and device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees