Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

288 results about "Codebase" patented technology

In software development, a codebase (or code base) is a collection of source code used to build a particular software system, application, or software component. Typically, a codebase includes only human-written source code files; thus, a codebase usually does not include source code files generated by tools (generated files) or binary library files (object files), as they can be built from the human-written source code. However, it generally does include configuration and property files, as they are the data necessary for the build.

Method for detecting unknown malicious code

The invention discloses a method for detecting an unknown malicious code in the technical field of information safety, which can detect the malicious code in a file in advance under the situation that a malicious code library is not updated. The method comprises the following steps: extracting the feature vector of a file in a training set by utilizing a Byte n-grams method; carrying out the dimension reduction to the extracted feature vector of the file in the training set by adopting a local linear embedding algorithm; taking the feature vector after being subjected to dimension reduction as input, training a kernel cover classifier by utilizing a kernel cover learning algorithm; extracting the feature vector of the file in a test set by utilizing the Byte n-grams method again; carrying out the dimension reduction to the extracted feature vector of the file in the test set by adopting the local linear embedding algorithm; inputting a result after being subjected to dimension reduction into the kernel cover classifier for classification; and calculating the classification result and determining whether the file in the test set contains the malicious code. With the adoption of the method, the detection speed of the file is improved, and the advanced accuracy detection of the malicious code is realized.
Owner:NORTH CHINA ELECTRIC POWER UNIV (BAODING)

Flexible instruction processor systems and methods

A design system for generating configuration information and associated executable code based on a customisation specification, which includes application information including application source code and customisation information including design constraints, for implementing an instruction processor using re-programmable hardware, the system comprises a template generator for generating a template for each processor style identified as a candidate for implementation; an analyser for analysing instruction information for each template and determining instruction optimisations; a compiler for compiling the application source code to include the instruction optimisations and generate executable code; an instantiator for analysing architecture information for each template, determining architecture optimisations and generating configuration information including the architecture optimisations; and a builder for generating device-specific configuration information from the configuration information including the architecture optimisations. In another aspect, a management system for managing run-time re-configuration of an instruction processor implemented using re-programmable hardware, comprises a configuration library containing configuration information for a plurality of instruction processor implementations; a code library for containing associated executable code for the implementations; a loader for loading application data and, as required, configuration information and associated executable code into re-programmable hardware for implementation and execution of an instruction processor; a loader controller for signalling the loader to load application data and, as required, configuration information and associated executable code, and execute the executable code; a run-time monitor for obtaining run-time statistics relating to operation of the instruction processor; an optimisation determiner configured to receive the run-time statistics, and being operable to instruct the loader to load new configuration information and associated executable code for a new implementation into the re-programmable hardware; and an optimisation instructor for invoking the optimisation determiner.
Owner:LUK WAYNE +2

Code snippet recommendation method based on sequence-to-sequence model

The invention discloses a code snippet recommendation method based on a sequence-to-sequence model. The method comprises the steps of collecting and cleaning code snippets and corresponding queries; extracting code information; performing an identifier replacement operation on the code snippets; combining the code snippets after the identifier replacement operation and the corresponding queries into a set of (code, query) pairs, and taking the set as a training set of a query generation model; training a query generation model by using the sequence-to-sequence model; generating a query for thecode snippets of the recommendation code library; inputting a query, and executing similarity calculation between the query and the generated query; and according to a similarity calculation result,constructing a generated query list according to a descending order of similarity scores, and retrieving code snippets corresponding to queries in the list from a recommendation code library to serveas code snippet recommendation results. The method is superior to some existing research works, the code snippet recommendation effect can be effectively improved, and the software development efficiency is improved.
Owner:NANJING UNIV OF AERONAUTICS & ASTRONAUTICS

Method for detecting cryptology misuse of Android application programs

The invention discloses a method for detecting cryptology misuse of Android application programs. The method comprises the following steps of decompiling a to-be-detected program and generating a codebase; then, looking up code segments related with a cryptographic algorithm from the codebase; then, stripping the code segments related with the cryptographic algorithm out of an original program to obtain a complete cryptographic algorithm implementation process code; finally, performing data abstraction and process modeling processing on each cryptographic algorithm implementation process code segment obtained in the step 3; comparing the cryptographic algorithm implementation process code segments item by item through pattern matching and a cryptographic algorithm implementation rule appointed in advance, outputting items which do not meet the implementation rule and summarizing to form a safety analysis result. According to the method disclosed by the invention, through static analysis on an Android application program, a cryptographic algorithm type used in the application program can be automatically judged, and the code segments related with the cryptographic algorithm are automatically extracted; safety analysis is performed on the code segments so as to find out a problem link during a cryptographic algorithm implementation process, and the safety analysis result of the cryptology misuse of the application program is finally obtained.
Owner:SHANGHAI JIAO TONG UNIV +1

Code merging method and related equipment for supporting application parallel development

The invention discloses a code merging method and related equipment for supporting application parallel research and development, wherein, the method comprises the following steps: collecting information of an application program to be developed, and generating an application program ID corresponding to the application program to be developed according to the information of the application programto be developed; Creating a requirement list of a corresponding application to be developed based on the application ID, adding requirement information to the requirement list, and configuring a codebase corresponding to the requirement information; searching code base corresponding to each requirement information of an application to be developed based on the application ID, and merging codes in the searched code base to obtain a merged code base. As that ID is generate by the application program to be researched and developed, the invention realizes that the application program is distinguished by the ID, the management of the application program is convenient, and the code base corresponding to each requirement of each application program is simultaneously merged based on the ID of the application program, thereby saving the cost of code merging.
Owner:BEIJING 58 INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products