Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

159 results about "Abstract syntax" patented technology

In computer science, the abstract syntax of data is its structure described as a data type (possibly, but not necessarily, an abstract data type), independent of any particular representation or encoding. This is particularly used in the representation of text in computer languages, which are generally stored in a tree structure as an abstract syntax tree. Abstract syntax, which only consists of the structure of data, is contrasted with concrete syntax, which also includes information about the representation. For example, concrete syntax includes features like parentheses (for grouping) or commas (for lists) which are not included in the abstract syntax, as they are implicit in the structure.

Abstract syntax notation to interface definition language converter framework for network management

A system and method for managing network devices. The framework may provide a suitable system for managed object data type conversions between various data description languages, such as an interface definition language (e.g., OMG IDL) and an abstract syntax notation (e.g., ASN1). This conversion facility may be used in both request and event network traffic, so common libraries may be used. Two separate libraries may be used: a converter framework library and a converter implementation library. The framework library provides a collection classes that may be used by the clients of the converter libraries. Most classes in the converter framework library are handle classes (or wrappers) to the real implementation (or body) classes in the converter implementation library. Framework classes hide the details of the real implementation classes and provide a simple, consistent interface to any data type converter via IDL. The converter implementation library provides the implementation needed by the framework to function properly, and may allow various different mappings to be used easily by implementing them as plug-in modules. The combination of using IDL and generic typing provides an efficient, generic solution to mapping data types across multiple platforms, multiple programming languages, and multiple object classes.
Owner:ORACLE INT CORP

Method and device for determining data consanguinity based on structural data

The present invention provides a method and device for determining data consanguinity based on structural data. The method comprises: parsing a selection statement to obtain a source abstract syntax tree, and organizing the table information and the field information obtained by traversing the source abstract syntax tree into a source list layer by layer; obtaining the target abstract syntax treeby parsing the insertion statement, and organizing the table information and the field information obtained by traversing the target abstract syntax tree into the target list layer by layer; traversing the source manifest to obtain the source table information and traversing the target manifest to obtain the target table information to obtain the table granularity data kinship relationship; extracting the target field information for the target table from the target manifest, starting from the first layer of the source manifest, finding the source field in the source table with the same name as the target field information of the target table layer by layer, and when the source table to which the source field belongs no longer comes from the subquery, determining the corresponding source field to be the source field with blood relationship corresponding to the target field information. The scheme can parse the field-level granularity of data consanguinity based on structured data.
Owner:RAJAX NETWORK &TECHNOLOGY (SHANGHAI) CO LTD

Source code vulnerability detection method, detector and training method and system thereof

The invention discloses a source code vulnerability detection method, a detector and a training method and system thereof. The method comprises the steps of generating an abstract syntax tree based on each function in a source code, traversing all the abstract syntax trees, searching the code elements capable of being matched with the same vulnerability syntax feature, calling the code elements as the candidate vulnerability elements, and determining all the candidate vulnerability elements; based on a program slicing technology, identifying the code statements in semantic association with each candidate vulnerability element in the source code to determin the corresponding candidate vulnerability code segments, and adding the vulnerability labels to the candidate vulnerability code segments; and inputting the vector data corresponding to each candidate vulnerability code segment into a neural network model, and training the neural network model based on the label of each candidate vulnerability code segment to obtain a vulnerability detector. Based on the deep neural network, the vulnerability syntax features are extracted through a universal framework, the method is not limited to the vulnerability types and is high in expandability.
Owner:HUAZHONG UNIV OF SCI & TECH +1

Octet iterator template interface for protocol transfer syntax coding services

A method is disclosed that allows the concise implementation of one protocol encoding/decoding device for syntax conversion between an abstract data syntax and a transfer syntax presented in an open-ended variety of input/output/storage mediums, including, but not limited to random-access memory, disk files, communications sockets, buffer lists, and other static or dynamically-extensible storage structures. The abstract syntax is described using the Abstract Syntax Notation One standard and presented in a higher-level object-oriented programming language such as C++. The transfer syntax is specified by standardized encoding rules and results in a stream of octets (unsigned 8-bit characters) suitable for communication transport using the Open Systems Interconnection (OSI) protocol model. The result of encoding (which is also the input for decoding) is called a protocol data unit (PDU). For different applications, it may be useful to present the PDU using various input/output or storage mediums such as listed above. The disclosed method employs a template function parameterized on an octet output iterator interface to provide an ASN.1 encoding mechanism, and a corresponding template function parameterized on an octet input iterator interface to provide an ASN.1 decoding mechanism, both independent of the medium in which the PDU is presented.
Owner:OLIVER CHRISTOPHER

Method for Generating Visual Representations of Data Based on Controlled Natural Language Queries and System Thereof

InactiveUS20180144065A1Reduce and eliminate ambiguityReduce and eliminate and complexityDatabase management systemsOffice automationDatabase queryData set
A method for generating visual representations of data based on controlled natural language queries (CNL) using a configured dictionary of keywords (and their synonyms) and data fields (and their synonyms); the method comprising steps of: receiving said query to cause a set of one or more processors to analyse the said query and translating it into an abstract syntax tree (AST); representing the formal interpretation of the CNL query to the user wherein under condition that the CNL query cannot be translated unambiguously into a single AST, multiple abstract syntax trees (ASTs), each representing one possible interpretation of the CNL query, are generated and presented back to the user in their CNL form for the user to select one among the suggestions as the intended query; converting the AST into a database query and executed against the underlying database to obtain the result; providing a visual representation first real result containing a first dataset obtained from the database, the first dataset answering a first sub query that forms part of the main query; provide one or more further visual representation of real result, the or each further real result containing a respective further dataset obtained from the database, the or each further dataset answering a respective further sub-query that forms part of the main query; and obtaining a final visual representation of main query from the dataset from the first and one or more further real result answering the main query.
Owner:YELLAI MAHESH

Blood relationship analysis method of structured query language and tool thereof

The embodiment of the invention discloses a blood relationship analysis method of a structured query language, and a tool thereof. The blood relationship analysis method comprises the steps: extracting service systems of a plurality of different types of databases, and continuously importing the structured query language of the service systems into a message queue list in batches; preprocessing structured query languages containing static parameters and dynamic parameters in the message queue list respectively; performing grammatical proofreading on the preprocessed structured query language,generating abstract syntax trees matching the structured query languages of the different types of databases, traversing the abstract syntax trees, and obtaining the blood relationship of the structured query languages; and obtaining blood relationship veins and key blood relationship data of the blood relationship, finally forming a blood relationship map, and finally completing analysis and prediction of the service system. According to the embodiment of the invention, dynamic and static structured query languages of various types of databases can be analyzed continuously in batches, and data traceability and prediction of a service system are completed, and an analysis result is accurate.
Owner:SUNING CLOUD COMPUTING CO LTD

Static detection method for privacy information disclosure in mobile applications

The invention discloses a static detection method for privacy information disclosure in mobile applications. The method comprises the steps as follows: firstly, the completeness of codes is checked, if the codes are incomplete, preparatory work is performed on source codes, state machine description files corresponding to the privacy disclosure are loaded, related state machine information is obtained, the source codes are compiled to obtain detailed information of classes, functions and the like, pre-analysis is performed on the source codes, basic data structures such as abstract syntax trees and the like are generated, and call relations among the functions are obtained; and then detection and analysis is performed in units of the functions, state machine instances are created for all state machines with associated methods in the state machines, state machine instance iteration is performed on control flow diagrams corresponding to the functions, when the state machine instances are in error states, errors are reported, after detection is finished, the detected errors are checked manually, and detection results are confirmed. With the adoption of the method, the privacy disclosure codes existing in application programs of different operating system platforms can be effectively detected, so that the privacy information disclosure of users can be effectively prevented.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Time series database system based on column storage

ActiveCN110362572AImproved feature depth integrationHigh-speed index functionSpecial data processing applicationsDatabase indexingOn columnQuery optimization
The invention discloses a time sequence database system based on column storage. The time sequence database system comprises: an SQL (Structured Query Language) parser, wherein the SQL parser is usedfor converting SQL into an abstract syntax tree through parsing; a logic plan generator which is used for generating a logic query plan by utilizing the abstract syntax tree, wherein the logic query plan is expressed by a relation algebra; a query optimizer which is used for optimizing the query plan by utilizing the state information of the database and outputting the rewritten query plan; an executor which is used for executing the query plan in a block iteration mode and is responsible for interacting with the storage layer to obtain data queried by a user; and a storage engine which is used for storing data in a row and column manner. According to the invention, data in the database is stored in a column mode; based on combination of column storage and rocksdb, high-speed insertion data characteristics and an indexing function of a traditional database are achieved, in the aspect of an executor, part of operators are improved to be deeply combined with characteristics of a storageengine, and meanwhile, new characteristics of a modern processor are used for accelerating query.
Owner:ZHEJIANG BANGSUN TECH CO LTD +1

Realization method for reasonable construction and correct parse of communication data package based on alarm system

InactiveCN103095835ASolve the problem that it is difficult to distinguish correctly, and some even cannot be parsed correctlyAccurate analysisError preventionNetwork packetStream data
The invention relates to the technical field of security of computer networks, in particular to a realization method for reasonable construction and correct parse of a communication data package based on an alarm system. Fixed-length data package header identification is used as data package feature identification, the length of a fixed-length data package is set at the rear of the data package header identification, the system can parse the finial size of the package according to the length of the data package after receiving data and then parse out the whole data package, and the size of the whole package can be known without traversing to the end of the package. A coding scheme of abstract syntax markup is used for coding to divide the data into the operation type of Cmd and the operation content of Value, wherein Key corresponds to the header of data package, Length corresponds to the data length, Cmd and Value both correspond to the data, Key, Length, Cmd and Value are coded through the coding and the decoding rule to form a bit stream data package, and the data content is encrypted and decrypted through a special encryption protocol. The security and the transmission speed are obviously promoted.
Owner:成都理想科技开发有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products