A security assessment method for software architecture based on evidence synthesis theory
A software architecture and architecture technology, applied in fuzzy logic-based systems, based on specific mathematical patterns, electrical components, etc., can solve problems such as dynamic security assessment of difficult software
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0178] Taking a flight control system as an example, the architecture model is as follows: Figure 5 As shown, among them, "flight control console" Operating) is the man-machine interface of the flight control system, which has the function of setting the working state of the system by the driver and indicating the working state of the system. The system is composed of stability augmentation / control stability augmentation subsystems (pcs, lcs), automatic flight subsystem (ap_manage) and automatic trim subsystem (pap), and the stability augmentation / control stability augmentation subsystem is a three-redundant configuration (rm); At the same time, the system also has a line control subsystem, mainly the flight status selector (CDS); and several main modules of the system bit.
[0179] Step 1. For a certain software system, use modules to construct the architecture model of the software system;
[0180] In the present invention, the above several modules are regarded as the com...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com