Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

260 results about "Program structure" patented technology

Program structure The overall form of a program, with particular emphasis on the individual components of the program and the interrelationships between these components. Programs are frequently referred to as either well structured or poorly structured.

Test program control stream path set creation method based on base path

The invention pertains to a path testing in a program testing. The concept of a program control flow base path is defined through bringing in the concept of base in mathematics, a data structure showing a program structure of a source program slice is obtained by using a compiler module first; then through traversing the data structure, a control flow path generating algorithm is utilized to generate a subset compiler module of a program control flow path which is based on a base path to interpret the semanteme on a tested source program, an abstract syntax tree structure showing the structural information of the tested program control flow is output. An adjacency matrix of a control flow graph generates a module ergodicity abstract syntax tree structure, and generates the adjacency matrix representation of a program flow chart. A control flow path subset generating module acquires the control flow information of the tested program through traversing the adjacency matrix, traverses the adjacency matrix by adopting a depth-first multiple backtracking method, and processes sentence nodes, thus a program control flow path subset based on the base path is generated. The method has the outstanding advantages in generating results and flows, and can be widely used in the engineering practice of a path cover testing in a software structure testing.
Owner:SICHUAN UNIV

Privacy leaking detecting method and system for android application network communication

ActiveCN107133519AAccurate Privacy Leakage BehaviorAccurate detection of privacy leakage behaviorWeb data indexingPlatform integrity maintainanceMan-in-the-middle attackInternet privacy
The invention discloses a privacy leaking detecting method and system for android application network communication. The method comprises the following steps: crawling android application to be detected, and building an application set to be detected; building a main-in-the-middle attack server; initializing each tester environment; arranging a multi-tester distributive running scheduling system; analyzing APK files of the application to be detected; installing the application program corresponding to the APK file, and driving the application program to run; analyzing a log file created by the Burp Suite, and acquiring the application set with SSL man-in-the-middle attack; analyzing a network data pack file created in the running process of the collected application program; recognizing the privacy leaking type of the network data pack file according to the application set with the SSL man-in-the-middle attack. The method is flexible to use, and automatic in the whole process; the android system and the android application program structure are not modified; the privacy leaking behavior of the android application in the network communication process can be safely and accurately detected.
Owner:HUAZHONG UNIV OF SCI & TECH

Method and system for automatically generating codes through classification and configuration

The invention discloses a method and a system for automatically generating codes through classification and configuration. The method for automatically generating codes through classification and configuration comprises the following steps: recording functions of a system menu, a module, functions of each module, and definition and classification of interface content of each module; separating contents of a View layer and a Model layer in the three-layer structure of a model view controller (MVC) of the entire system program structure into files corresponding to every database table; setting a special data binding mechanism to realize the automatic synchronization of presentation content of the View layer and the data of the Model layer according to the configuration information; and enabling a Controller layer to obtain the necessary information of various kinds of logic operation of the present modules according to the configuration information through the synchronization mechanism of the View layer and the Model layer so as to accomplish the realization of the public operation, and expanding Controllers to realize the similar logics. The method and the system disclosed by the invention can automatically generate program codes according to the configuration record, greatly reduce the workload and the development time of the entire software develop period, and greatly enhance the quality of a target system at the same time.
Owner:SHANGHAI XUEZHI TECH

Variable debugging method of embedded program dynamic storage allocation

A variable debugging method of embedded program dynamic storage allocation is characterized in that the logining of an interface of the structural body of an embedded program is achieved, an upper computer is provided with a program sum of debugging the structural body of the embedded program, the communication protocol of the debugging of variables is achieved, the communication protocol is debugged through an upper computer program and the embedded program, the variable name of a level to be debugged is input on an upper computer software by a user, the upper computer software reads program header files, analyzes a data structural body, and calculates the relative offset address and the data type information of each member variable, and a variable debugging table is formed, and is downloaded in a device. The software records a structural body example word address of dynamic application in a constructor, and inquires an relative address according to a debugged level variable name, the structural body word address is added, the absolute address of each member variable is obtained, and the data of the absolute address are accessed and are sent to the upper computer to display. The variable debugging method of the embedded program dynamic storage allocation overcomes the defect that in the past only the global variable of the static allocation of a compiler can be debugged, and improves the diagnosis efficiency of the program.
Owner:NR ELECTRIC CO LTD +1

Parallel programming model system of DAG oriented data driving type application and realization method

The invention discloses a parallel programming model system of DAG oriented data driving type application and a realization method. The parallel programming model system of DAG oriented data driving type application comprises a DAG mode chart module, a user application program module and a DAG runtime system module, wherein the DAG mode chart module comprises a DAG mode chart bank; the user application program module is used for user initialization setup and confirmation of specific parallelization algorithm; and the DAG runtime system module comprises a main thread and a thread pool. The main thread is used for analyzing and updating the DAG mode chart, issuing and dispatching data block, and controlling fault-tolerance; the thread pool comprises a thread pool queue buffer zone and a work thread, wherein the thread pool queue buffer zone is a data interface for the main thread and the work thread, the work thread is used for constantly acquiring computing tasks from the queue buffer zone and carrying out computing. Compared with the prior art, the invention decreases difficulty in designing and developing a parallel computing application program for non-computer professionals, shortens development period of parallel software, and enables the completed parallel computing application program to have more reasonable structure and more optimized performance.
Owner:TIANJIN UNIV

Large-scale application regression testing information processing method based on Java bytecode

The invention relates to a large-scale application regression testing information processing method based on Java bytecode. The large-scale application regression testing information processing method based on Java bytecode comprises a plug-in step of injecting an object code; a step of acquiring an operating path of the object code at high efficiency, a mapping and storing step of an established relationship between the object code and a testing case; a step of comparing an object code in a new version and an object code in a cold version; an involved analysis step of automatically selected cases which need to be subjected to regression testing; a step of continuously improving the regression testing based on a version stream; a step of automatically generating all code structures and calling relationship of an object application; a step of carrying out data comparison based on a program structure and code semantic; a step of plugging exploration logic in the object application bytecode so as to dynamically acquire a complete code-operating path and coverage data; a step of controlling regression testing trigger of testing cases; and a step of representing a mapping relationship and an involvement relationship between the testing case and the code on a friendly interface. According to the large-scale application regression testing information processing method, the testing case is subjected to deep analysis, an original progress black-box state is converted into a semitransparent state, so that testing personnel can implement testing better.
Owner:SHANGHAI FAIRYLAND INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products