Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

283 results about "Code line" patented technology

Interactive on line code inspection process and tool

A code inspection tool comprises a plurality of physical computing resources connected by a network facility, eg an LAN, intranet or internet, and a voice conferencing communications facility. The code inspection tool interfaces with a known configuration management system to load a quantity of original source code. A group of developers use a plurality of graphical user interfaces to inspect the code. All graphical user interfaces log into display views generated on a main graphical user interface, which is operated by a human controller of a code inspection session. The code inspection tool comprises means for allowing developers to compile annotation data and forward the annotation data from their respective graphical user interfaces to a centralized data store. Internal algorithms of the code inspection tool compile markers relating the annotation data files to individual lines of source code. During a code inspection session, all developers view a same display, which sets out original source code, side by side with new source code on a line by line basis, matching the line numbers of the original source code with those of the new source code. Changes to the original source code and new source code are visually identified by automatic generation of icons next to the appropriate source code lines on the display. Annotations to the source code lines are indicated by further icons next to the appropriate lines. The tool automatically generates data describing statistics of a code inspection process, for example number of lines inspected, during of a code inspection session, proportion of original and new code lines inspected. Code inspection reports may be generated in a variety of formats, eg plain text or HTML, and automatically distributed to individual developers over the networked facility.
Owner:RPX CLEARINGHOUSE

Code coverage rate collection method and device

The invention provides a code coverage rate collection method and a code coverage rate collection device. The method of one embodiment comprises the following steps: receiving a service request sent by a terminal, wherein the service request contains an application identifier; acquiring a source file corresponding to the application identifier, a source file identifier and syntax tree information of the source file according to the service request; loading a source code of the source file into an internal memory; executing the source code loaded into the internal memory and recording code coverage rate data of a code line for executing the source code based on the syntax tree information in an executing process of the source code; sending code coverage rate reporting information to a code coverage rate collection central server, wherein the code coverage rate reporting information contains the source file identifier and the code coverage rate data; and determining the code coverage rate of the source file according to the code coverage rate reporting information, which is unloaded by code coverage rate collection terminal servers, by the code coverage rate collection terminal servers. According to the code coverage rate collection method and device, the collection of the code coverage rates of the servers is realized, and the source code does not need to be modified; and reediting on the source code of developers is not influenced.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Software version evolution comparison analysis method based on AST

The invention provides a software version evolution comparison analysis method base on AST. Two software version source codes are compared and analyzed by a Diff order of a Unix, and changed source codes are divided into three source codes; AST information of the two software version source codes are obtained by a syntactic parser, and corresponding AST information of each line of code of each source code block is analyzed and obtained; obtained syntax node information is combined into combined information, and adjacent code lines with same identifications are combined into a module; identification information of the two source code blocks are compared and analyzed under the condition that modules are used as units, the identification information is subjected to classification analysis according to module evolution conditions, each evolution condition is processed by a preprocessing method and a secondary processing method, and evolution information is stored into a database and transformed into HTML codes. Compared with evolution comparison analysis methods of other software versions, the software version evolution comparison analysis method base on the AST can improve the accuracy rate of the obtained evolution information and improve the efficiency of software version evolution and analysis.
Owner:HARBIN ENG UNIV

Weak software watermark method used for software configuration management

The invention provides a novel fragile software watermarking method for software configuration management. The basic thought of the method is to fully utilize the frangibility of software watermarking to identify the version alteration of software and take watermarking information as an evidence of version identification and retrieval. The method comprises the following steps of: firstly, grouping program codes; secondly, generating various groups of code program information according to various groups of the program codes; thirdly, splicing the groups of the code program information to obtain integral program information; fourthly, splicing the integral program information, author information and time information to obtain final watermarking information; and finally embedding the watermarking information into a first code line containing a program start character of a first group of programs and a final code line containing a program end character of a final group of programs in a write file mode to obtain a program containing the watermarking information. The proposal can effectively overcome and solve the disadvantages and problems existing in the prior software version control method in the software configuration management, and can also be applied to technology such as software tamper resistance and content authentication at the same time.
Owner:GRADUATE SCHOOL OF THE CHINESE ACAD OF SCI GSCAS

Software vulnerability detection method and device based on graph convolution network

The invention belongs to the technical field of computer security, and particularly relates to a software vulnerability detection method and device based on a graph convolution network, and the methodcomprises the steps: collecting a code sample data set; for the code sample data set, based on the abstract syntax tree and the control flow graph, extracting a code feature semantic expression formin code behavior units; and performing classification detection on the extracted code feature semantic expression form through the trained and learned graph convolutional network, and obtaining software vulnerabilities in the code according to a classification detection result. According to the invention, through extracting the abstract syntax tree, the control flow and the data flow information of the code, a code feature semantic expression mode taking a code as a unit is formed. The possibility that the vulnerability exists in the code is analyzed by using the graph convolution network in deep learning and the characteristics analyzed by the data flow extracted based on the abstract syntax tree, so that the vulnerability detection efficiency and accuracy are effectively improved, the software code reliability is ensured, the software quality is improved, and the method has important significance for software security application.
Owner:上海信息安全工程技术研究中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products