A security protocol javascript language implementation analysis method and a security protocol javascript language implementation analysis device based on model extraction
A security protocol and analysis method technology, applied in the direction of platform integrity maintenance, software testing/debugging, etc., can solve problems such as insecure implementation of security protocols, and achieve the effect of ensuring data security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0047] This embodiment provides a method for analyzing the implementation of security protocol javascript language based on model extraction, please refer to figure 1 , the method includes:
[0048] Step S1: Select the core sentences required for the implementation of the security protocol from the preset sentence library, and obtain the implementation subset SubJS of the security protocol javascript language and the BNF corresponding to the implementation subset SubJS based on the core sentences.
[0049] Specifically, the inventors of the present application have discovered through a large amount of research and practice that no complex statements are used in the implementation of the security protocol Javascript language. As a formal language, calculus is mainly used to model the communication between concurrent processes. Its grammatical structure is relatively simple. If all statements of javascript language are taken into consideration, it is too cumbersome and it is dif...
Embodiment 2
[0191] This embodiment provides an analysis device based on model extraction for the implementation of security protocol javascript language, please refer to Figure 15 , the device consists of:
[0192] The implementation subset obtaining module 201 is used to select the core statements required for the implementation of the security protocol from the preset statement library, and obtain the security protocol javascript language implementation subset SubJS and the BNF corresponding to the implementation subset SubJS based on the core statement;
[0193] The Applied PI calculation obtaining module 202 is used to obtain the Applied PI calculation and the BNF corresponding to the Applied PI calculation;
[0194] The mapping model acquisition module 203 is used to map the statements in the security protocol Javascript language to the corresponding statements of the Applied PI calculation based on the semantic consistency, according to the BNF corresponding to SubJS and t...
Embodiment 3
[0203] See Figure 16 , based on the same inventive concept, the present application also provides a computer-readable storage medium 300, on which a computer program 311 is stored. When the program is executed, the method as described in the first embodiment is implemented.
[0204] Since the computer-readable storage medium introduced in the third embodiment of the present invention is a computer device used to implement the analysis method implemented in the javascript language of the security protocol based on model extraction in the first embodiment of the present invention, it is based on the introduction in the first embodiment of the present invention method, those skilled in the art can understand the specific structure and deformation of the computer-readable storage medium, so details are not repeated here. All computer-readable storage media used in the method in Embodiment 1 of the present invention fall within the scope of protection intended by the present i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



