Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

48 results about "Intel HEX" patented technology

Intel HEX is a file format that conveys binary information in ASCII text form. It is commonly used for programming microcontrollers, EPROMs, and other types of programmable logic devices. In a typical application, a compiler or assembler converts a program's source code (such as in C or assembly language) to machine code and outputs it into a HEX file. Common file extensions used for the resulting files are A43 or HEX. The HEX file is then read by a programmer to write the machine code into a PROM or is transferred to the target system for loading and execution.

IC card file system

File system for IC CARD comprising an integrated circuit IC, non volatile memories ROM and/or E2PROM and at least a volatile memory RAM, for organizing files storage inside the non volatile memories and defining, through a logical structure, their accessibility by an IC Card application, stored inside one of said non volatile memories or IC or loaded in the volatile memory and in communication with an external read-write device; an interchange application, stored inside one of said non volatile memories, drives the organization of files in an additional tag-length logic structures of arbitrary length, allowing the identification of files through alphanumeric identifiers of arbitrary length and extension, and their accessibility by an external read-write device, eventually non IC card purpose, like a workstation a personal computer or a PDA interconnected to the IC Card by means of standard communication interface. The file system organizes said tag-length logic structure as individually memory blocks, each identified by an hexadecimal identification number and a block size and one of these memory blocks, more particularly one per non volatile memory, describes the content of the non volatile memory, comprising the number of files stored, their file name and extension and, for each file, the location of memory blocks composing its content.
Owner:STMICROELECTRONICS INT NV

Detection of malicious computer executables

A method of detecting malicious binary executable files is accomplished by inputting a binary executable file; converting the binary executable file to byte hexadecimal text strings; calculating the frequency of each byte pattern in the byte hexadecimal text strings; selecting characteristic byte pattern frequencies as discriminating features; classifying the discriminating features as malicious or benign; labeling the binary executable file as malicious or benign; and outputting the labeled malicious or benign binary executable file.
Owner:LOS ALAMOS NATIONAL SECURITY

Hex key holder with mechanism for pivotably securing a smaller block to a larger block for facilitating access to hex keys in the smaller block

A hex key holder in one embodiment includes a larger block including a plurality of penetrating channels of circular section for retaining a plurality of first hex keys, and a curved arm extending forwardly from one side of the larger block, a smaller block including a plurality of penetrating channels of circular section for retaining a plurality of second hex keys smaller than the first hex keys, and a pivot for pivotably securing the smaller block between the larger block and the arm. The invention can facilitate access to the second hex keys by tilting the smaller block.
Owner:JACO INT CORP

Migration apparatus which convert application program of mainframe system into application program of open system and method for thereof

The invention provides a migration apparatus and method for converting an application program of a mainframe system into an appropriate application program for an open system. The migration apparatus includes: a source obtaining module connected with the mainframe system, and decoding and obtaining sources of work-specific application programs made of Extended Binary Coded Decimal Interchange Code(EBCDIC) in binary form; a code conversion module converting the respective sources of the work-specific application programs obtained by the source obtaining module into American Standard Code for Information Interchange (ASCII) code, hexadecimal characters being converted to correspond to ASCII code using a previously set hexadecimal code conversion table; a compiling and link processing module compiling the sources of the work-specific application programs converted by the code conversion module and then bundling the compiled sources of the work-specific application programs with corresponding work application programs; and an executable file generation module generating executable files in binary form from the work-specific application programs processed by the compiling and link processing module to execute them in an environment of the open system. The migration apparatus and method efficiently reuse a conventionally used application program via the rehosting process of converting a mainframe system into an open system.
Owner:SAMSUNG SDS CO LTD

Adaptive Transaction Message Format Display Interface for Use in a Message Data Exchange System

A system provides an integration engine debugging and trace function that adaptively captures and displays trace information and promotes easier and more efficient troubleshooting. A system adaptively displays transaction message data for use with a data exchange system for exchanging data between different computer systems using different data formats. The system includes a repository of data comprising transaction messages communicated between different computer systems using different data formats. A data converter converts transaction message data into Hex and non-Hex representations. A display processor provides data representing a first display image including data representing a single transaction message in both Hex and non-Hex data format and enabling a user to initiate generation of a second display image for presenting the transaction message exclusively in a non-Hex representation.
Owner:CERNER INNOVATION

Data compression method for supporting virtual memory management in a demand paging system

A virtual memory management unit ( 306 ) includes a redundancy insertion module ( 307 ) which is used for inserting redundancy into an encoded data stream to be compressed, such that after being compressed each logical data block fits into a different one from a set of equal-sized physical data blocks of a given size. For example, said redundancy may be given by no-operation (NOP) instructions represented by a number of dummy sequences of a given length (L) into an encoded data stream to be compressed, each dummy sequence being composed of a number of identical binary or hexadecimal fill-in values.
Owner:SONY ERICSSON MOBILE COMM AB

Method for analyzing and managing log file with hexadecimal data

The invention relates to a method for analyzing and managing a log file with hexadecimal data, which comprises the following steps: obtaining the content of a log file with hexadecimal data, which is recorded in a form of the hexadecimal data, in the process of opening the log file with the hexadecimal data, and loading the obtained hexadecimal data by using a multi-dimensional array; and combining the hexadecimal data in the multi-dimensional array and a relevant communication protocol together for analyzing by row division and byte division, reading the content in the hexadecimal data into information which can be directly read and also displaying the information on a man-machine interactive interface, wherein a multi-layer display mode is adopted for the man-machine interactive interface, and the relevant communication protocol is a private communication protocol corresponding to the log file. According to the method disclosed by the invention, the content of a log file with hexadecimal data generated by communication software can be analyzed; and moreover, by combining the relevant communication protocol, the content of the log file, which is recorded by the hexadecimal data, is read into the information which can be directly read, and the information is also displayed by changing the protocol. The method for analyzing and managing the log file with the hexadecimal data can be used for conveniently managing and analyzing the log file with the hexadecimal data.
Owner:FENGHUO COMM SCI & TECH CO LTD

Serial data cursor

A serial data cursor for extracting content from an analog waveform representing a serial digital data stream has a horizontal length equal to a “word-time” as determined by parameters of a protocol for the serial digital data stream and a clock recovered from the serial digital data stream. The serial data cursor delimits a portion of the analog waveform, which is then decoded into human readable form, such as binary, octal, hexadecimal, alpha-numeric or the like. A trigger may be generated from a specific parameter of the protocol, such as a frame start, so that the serial data cursor initially highlights a first data word of a frame of the serial digital data stream. Alternatively the decoded portion of the analog waveform may be compared to the specific parameter, and the serial data cursor incremented by a “bit-time” until the specific parameter is found in the serial digital data stream.
Owner:TEKTRONIX INC

System and method for generating a unique, file system independent key from a URI (Universal Resource Identifier) for use in an index-less VoiceXML browser caching mechanism

A method and system of storing and accessing documents on a computer file system utilizing a file system-independent key for use in an index-less browser caching mechanism. The present invention is a method and system for storing a resource such as a document or group of documents on a computer file system using a Universal Resource Indicator (URI) as the file name by generating a unique system-independent key from the URI for use in an index-less browser caching system. The invention takes into account the various file entry length limitations enforced by each unique file system by converting the specified URI into a key containing hexadecimal values of the key's characteristics. In this fashion, an index-less browser caching system such as a Web browser of a VoiceXML browser is created that is file system-independent.
Owner:IBM CORP

Method for automatically generating check code of development program of embedded system

The invention relates to a method for automatically generating a check code of a development program of an embedded system, which comprises the following steps of: (1) compiling a CommA for calculating the check code and automatically calculating the check code command according to an output file of a compiler; (2) compiling a CommB which adds and writes the check code generated by the CommA to a generated hexadecimal or binary file; (3) after compiling and generating the hexadecimal or binary source file, automatically operating the check code command of the calculation program according to an open interface provided in the compiling development environment of the embedded system; and (4) executing the compiling process again and burning the code with automatically added check code to a device; The check code is generated automatically after compiling the code and unique check code is automatically generated and added according to change of the generated hexadecimal or binary source file; meanwhile the check code of the program can be automatically generated without manual operation so that the check code of the program is more unique and reliable.
Owner:SHENZHEN CLOU ELECTRONICS

Migration Apparatus Which Convert Application Program of Mainframe System into Application Program of Open System and Method for Thereof

Provided are a migration apparatus and method for converting an application program of a mainframe system into an appropriate application program for an open system. The migration apparatus includes: a source obtaining module connected with the mainframe system, and decoding and obtaining sources of work-specific application programs made of Extended Binary Coded Decimal Interchange Code (EBCDIC) in binary form; a code conversion module converting the respective sources of the work-specific application programs obtained by the source obtaining module into American Standard Code for Information Interchange (ASCII) code, hexadecimal characters being converted to correspond to ASCII code using a previously set hexadecimal code conversion table; a compiling and link processing module compiling the sources of the work-specific application programs converted by the code conversion module and then bundling the compiled sources of the work-specific application programs with corresponding work application programs; and an executable file generation module generating executable files in binary form from the work-specific application programs processed by the compiling and link processing module to execute them in an environment of the open system. The migration apparatus and method efficiently reuse a conventionally used application program via the rehosting process of converting a mainframe system into an open system.
Owner:SAMSUNG SDS CO LTD

Hexadecimal file fast decompression method

A computer implemented method of selectively accesses a set of subdivisions of a compressed file, wherein the compressed file is a hex dump file. A request to access a first data byte string is received. The first data byte string has a first address from within the compressed file. The compressed file comprises a plurality of subdivisions. Each of the plurality of subdivisions is provided with an address range to indicate the addresses of byte strings contained therein. The address range for each of the plurality of subdivisions is the file name for each of the plurality of subdivisions. A set of subdivisions from the plurality of subdivisions is identified that contains a first data byte string. The step of identifying the set of subdivisions comprises comparing the first address to the address range for the plurality of subdivisions. Only the set of subdivisions which contains the first data byte string is extracted.
Owner:IBM CORP

Content preloading method in mobile terminal apparatus

The present invention relates to a method for saving various content to be installed as a file system image installed in a mobile terminal in advance, and then downloading it to the flash memory of the mobile terminal, which is characterized in that it contains in sequence: Download the application software and template content of the mobile terminal successively, convert the template content into a hexadecimal image file and save it in the flash memory system, read the hexadecimal image of the application software into decimal, and insert the hexadecimal image file of the above template content. Hexadecimal image file and then synthesize it with the image file of the application software to generate a hexadecimal image file, and download the finally generated hexadecimal image file to the mobile terminal. The invention can be installed in the terminal machine without additional manufacturing engineering, and reduces the failure rate that may occur when downloading or installing by manual operation in the manufacturing engineering of the mobile terminal machine.
Owner:LG ELECTRONICS (CHINA) R&D CENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products