Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

264 results about "Code reuse" patented technology

Code reuse, also called software reuse, is the use of existing software, or software knowledge, to build new software, following the reusability principles.

System and method for using dynamic web components to remotely control the security state of web pages

The present invention involves a new system and process for automatically controlling whether a displayed web page and associated frames displayed within a window of a web browser are secure or non-secure. For example, whether the displayed web page and associated frames are provided via a secure socket layer (SSL), i.e. a web page from an HTTPS address (secure), or simply via an HTTP address (non-secure), respectively. Specifically, the present invention uses a dynamic “Web Component” to remotely control web page security states. Further, the Web Component according to the present invention uses the same script and HTML for all implementations or instantiations of the Web Component, regardless of which, or how many, unique local clients make use of the Web Component. This code reuse is accomplished by using entry web pages, or “entry points,” as described in further detail below, to set the value of function properties or parameters of the Web Component for dynamically and controlling the security state of a web page having at least two frames. The script and/or HTML source code of the Web Component pages does not change based on each new implementation or instantiation. Consequently, little setup work is required for each implementation, and only a basic verification test pass is needed for each unique automatically customized Internet web page.
Owner:MICROSOFT TECH LICENSING LLC

Code reuse method applied to test system

The invention discloses a code reuse method applied to a test system. The method comprises the steps that a header file and a code file matched with the header file of a reused code among test framework codes are selected; the header file is analyzed automatically through a regular expression, and a function meeting format requirements is obtained from the header file; analyzed information is displayed in a graphical interface, and a call position, a return value and parameters to be transmitted to the function are configured for the function in the graphical interface; after configuration is completed, validity check is automatically conducted on the configuration; a call statement of the function is automatically added to the selected position, statements contained in the header file are added to corresponding positions, and the header file, the code file and other generated code files are jointly compiled to generate an executable program. According to the code reuse method, the call statement of the function is generated automatically according to test demands and added to the required position; the codes can be analyzed automatically, and information related to the function can be obtained, so testing personnel can complete configuration of code reuse conveniently in a graphical interface operation mode.
Owner:BEIHANG UNIV

Kernel-level code reuse type attack detection method based on QEMU

The invention discloses a kernel-level code reuse type attack detection method based on QEMU. The method mainly solves the problem of relying on hardware or need of modifying kernel source code in the prior art. According to the method, a function module of a QEMU virtual machine manager is expanded; each instruction which operates on the function module and in an operating system kernel is traversed and detected; jumping instructions relevant to the control flow process are recognized from the instructions, wherein the jumping instructions include ret and indirect call instructions; the jumping target addresses of the instructions are recorded; then, the target addresses are compared with legal target addresses in the system normal execution flow process for detecting whether a system is normally executed or not; and meanwhile, the interruption return addresses pushed into a stack during the interruption occurrence and the return addresses used during interruption actual return are subjected to comparison verification, so that whether attack occurs or not is judged. The kernel-level code reuse type attack detection method has the advantages that by aiming at the characteristic that the system original execution flow process needs to be changed for the code reuse type attack, the attack can be effectively discovered by monitoring the kernel execution flow process change instructions (and positions), and the kernel-level code reuse type attack detection method can be used for protecting the security of an operating system.
Owner:XIDIAN UNIV

Method, device and processor for developing business processes

The invention relates to the technical field of computers and discloses a method, device and processor for developing business processes. The logic that business process developing is converted into attribute configuration from code writing is adopted, so that the developing process of the business processes are converted into the configuration performed on the business process. According to the method for developing the business process, firstly, the business processes to be developed are configured with corresponding business process information, then the business process information is obtained and includes configuration information corresponding to all nodes, corresponding business presentation views are configured, then business requirement information is received for filling, and complete business presentation views are obtained. Due to the fact that according to the method for developing the business processes, the configuration means is adopted for configuring the corresponding business information for the business processes to be developed according to the similarities of the business processes, needed business can be developed according to business information and the received business requirement information, and then the problems that in the prior art, when the business processes are developed, code redundancy and a low code reuse rate exist are solved.
Owner:BEIJING CHINA POWER INFORMATION TECH +1

Format conversion method and device of special interface tool

The invention discloses format conversion method and device of a special interface tool, which are used for realizing the conversion of widget among arbitrary formats. The widget format conversion method comprises the following steps of: selecting a corresponding target template from a template base according to a target format to be converted of a source widget, wherein each template in the template base is used for describing file information of a widget in a corresponding format; unpacking the source widget to obtain a source widget file set; carrying out format recognition according to the source widget file set to determine a source format, and selecting a corresponding source template from the template base according to the source format; carrying out correlation on the file information with the same semanteme in the source template and the target template according to a widget body, and generating a target widget file set on the basis of the source widget file set; and packing the target widget file set to obtain a target widget, wherein the widget body is used for describing the semanteme correlation of the file information among each template in the template base. The invention reduces the development cost of the widget and improves the development efficiency of the widget and code reuse ratio.
Owner:CHINA MOBILE COMM GRP CO LTD

Interface logic control method based on 3D (three-dimensional) model

The invention relates to an interface logic control method based on a 3D (three-dimensional) model. The interface logic control method based on the 3D model comprises the following steps of: a) loading a 3D model, and storing the information of the 3D model into a data structural body; b) storing animation data in the data structural body as one data block in the data structural body; and c) setting a focal point switchover attribute, a state change attribute and a event call-back attribute in the data structural body, wherein the focal point switchover attribute is used for setting a next focal point model after the focal point is changed, the state change attribute is used for invoking a corresponding animation in the data block to be played, and the event call-back attribute is used for calling the corresponding call-back attribute. With the method disclosed by the invention, the 3D model is packaged and subjected to attribute setting, so that the attributes and corresponding events are correlative instead of directly coupling the interface with functions, the interface development and the function development are mutually independent, thus the 3D interface development difficulty is lowered, the code reuse ratio is improved, deep coupling between the interface and the corresponding functions is removed, and the development efficiency is improved.
Owner:SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products