Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software trustworthiness detection analysis method

An analysis method and reliability technology, applied in the field of software reliability detection and analysis, can solve problems such as the inability to meet the needs of the development of the software industry, and achieve the effects of improving development quality and efficiency, novel design, and improving evaluation accuracy.

Inactive Publication Date: 2018-01-02
清远博云软件有限公司
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are deficiencies that cannot meet the needs of the development of the software industry

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] In order to make the technical means, creative features, objectives and effects achieved by the present invention easy to understand, the present invention is further elaborated.

[0015] A software credibility detection and analysis method, including a standard indicator system management module, a software process acquisition module, a software credibility evaluation module, and a feedback result module. The standard indicator system management module builds an attack model library, adds threat degree attributes, and establishes an attack The many-to-one mapping relationship between patterns and software defects, so as to obtain the threat program of the software, the software process acquisition module builds a unified software model, software security knowledge base, and the software credibility evaluation module collects software and Correlation information between attack files, common configuration management module, for virtual machine mirroring, common configurat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software trustworthiness detection analysis method. The software trustworthiness detection analysis method comprises a standard index system management module, a software process acquisition module, a software trustworthiness evaluation module and a result feedback module, wherein the standard index system management module constructs an attack model library, threat levelproperty is enhanced, and many-to-one mapping relation between attack modes and software defects is established, so that a threat program of software is acquired; the software process acquisition module constructs a software safety knowledge library by constructing software models uniform in form, and the software trustworthiness evaluation module proves associated information between software acquisition and file attack by virtue of a theorem. The software trustworthiness detection analysis method disclosed by the invention has the advantages that defects of a software design model in a software development process can be effectively found, software trustworthiness evaluation accuracy is improved, and software development quality and efficiency are improved; and design is novel, so thatthe software trustworthiness detection analysis method disclosed by the invention is a good innovative scheme.

Description

technical field [0001] The invention relates to the technical field of computer software information, in particular to a software credibility detection and analysis method. Background technique [0002] The continuous emergence of software malicious attacks and the unsatisfactory status quo of software product quality have caused more and more attention to the issue of trustworthiness. With the continuous development of trusted software technology, there is an urgent need for reasonable trust evaluation methods to examine the contribution and effect of these technologies in improving trustworthiness. At the same time, in the process of software development, software engineers can also evaluate the credibility of the software through the evaluation system, timely discover defects introduced in the early stage of software design, and improve the quality and efficiency of software development. It provides an important reference for selecting the software that meets your needs ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/36G06F21/53G06F21/56
Inventor 陈春艳
Owner 清远博云软件有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products