FIELD: information technology.
SUBSTANCE: in the method for generating own code from a code in intermediate language for an application: in compute device an installation package for an application typical for the type of device is received from the online provider, the package includes files on machine-dependent intermediate language MDIL-files generated by online provider for an application, a binding list which includes a list of application MDIL-files subject to binding to generate own image for an application and a list of a set from one or more libraries subject to binding with corresponding MDIL-files, own image is saved on the computing device for use when the application is loaded for execution.
EFFECT: expanding the arsenal of means of installing, executing and updating managed applications.
8 cl, 10 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHOD FOR STATIC ANALYSIS OF EXECUTABLE BINARY CODE AND SOURCE CODE USING FUZZY LOGIC | 2021 |
|
RU2783152C1 |
MACHINE CODE ACCESS LIMITATION METHOD TO THE OPERATING SYSTEM RESOURCES | 2016 |
|
RU2625052C1 |
CACHING RUNTIME GENERATED CODE | 2009 |
|
RU2520344C2 |
REPUTATION-BASED AUTHORISATION DECISIONS | 2007 |
|
RU2458393C2 |
ENCODING AND INITIALIZATION OF SERVICE METADATA OF APPLICATIONS | 2020 |
|
RU2827021C1 |
GENERATION AND CACHING OF SOFTWARE CODE | 2013 |
|
RU2646329C2 |
SYSTEM AND METHOD FOR AUTOMATIC PROCESSING OF SOFTWARE SYSTEM ERRORS | 2012 |
|
RU2521265C2 |
CONFIGURATION OF ISOLATED EXTENSIONS AND DEVICE DRIVERS | 2006 |
|
RU2443012C2 |
METHOD OF CATEGORIZING ASSEMBLIES AND DEPENDENT IMAGES | 2015 |
|
RU2635271C2 |
METHOD FOR DETECTING HARMFUL ASSEMBLIES | 2015 |
|
RU2628920C2 |
Authors
Dates
2018-02-01—Published
2013-09-03—Filed