Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

293 results about "Codebase" patented technology

In software development, a codebase (or code base) is a collection of source code used to build a particular software system, application, or software component. Typically, a codebase includes only human-written source code files; thus, a codebase usually does not include source code files generated by tools (generated files) or binary library files (object files), as they can be built from the human-written source code. However, it generally does include configuration and property files, as they are the data necessary for the build.

Detecting a reverse proxy and establishing a tunneled connection therethrough

A method, system and apparatus for managing an interposed reverse proxy. The method can include comparing within a markup language document, a host address for the markup language document and a codebase address for a code base supporting logic disposed within the markup language document. If the host address and the codebase address differ, it can be concluded that a reverse proxy has obscured from view a server source of the markup language document. The method of the invention further can include retrieving a server affinity identifier for the server source from the configuration tags for the logic. Responsive to concluding that a reverse proxy has obscured from view a server source of the markup language document, a tunneled connection to the server source can be attempted through the reverse proxy by inserting the server affinity identifier in an address specified in the attempt.
Owner:IBM CORP

Building method and device for distributed development environment based on Docker

The invention discloses a building method for distributed development environment based on Docker. The building method comprises the following steps: receiving selection information for selecting a dockerfile file from a local prestored dockerfile file list by a user; judging whether the selected dockerfile file is the latest dockerfile file or not; if yes, reproducing source codes of a subsystem from a codebase according to the selected dockerfile file; building mirror images of the subsystem according to the latest dockerfile file; through the mirror images, building a docker container, and operating the source codes of the subsystem in the docker container. The building method realizes single machine deployment of the distributed development environment. The invention further discloses a building device applying the building method.
Owner:GUANGDONG ESHORE TECH

Method for detecting unknown malicious code

The invention discloses a method for detecting an unknown malicious code in the technical field of information safety, which can detect the malicious code in a file in advance under the situation that a malicious code library is not updated. The method comprises the following steps: extracting the feature vector of a file in a training set by utilizing a Byte n-grams method; carrying out the dimension reduction to the extracted feature vector of the file in the training set by adopting a local linear embedding algorithm; taking the feature vector after being subjected to dimension reduction as input, training a kernel cover classifier by utilizing a kernel cover learning algorithm; extracting the feature vector of the file in a test set by utilizing the Byte n-grams method again; carrying out the dimension reduction to the extracted feature vector of the file in the test set by adopting the local linear embedding algorithm; inputting a result after being subjected to dimension reduction into the kernel cover classifier for classification; and calculating the classification result and determining whether the file in the test set contains the malicious code. With the adoption of the method, the detection speed of the file is improved, and the advanced accuracy detection of the malicious code is realized.
Owner:NORTH CHINA ELECTRIC POWER UNIV (BAODING)

Mitigating malicious exploitation of a vulnerability in a software application by selectively trapping execution along a code path

A method of reducing the window of malicious exploitation between vulnerability publication and the installation of a software patch. One or more probe points are inserted into a code path in an application (or operating system if applicable) that contains one or more vulnerabilities (or coding errors). The probe points mark locations of the security vulnerabilities utilizing software interrupts to enable the original code base of the code path to remain unmodified. A probe handler utility subsequently monitors the execution of the code path and generates an alert if the execution reaches a probe point in the code path, thus indicating whether the application exhibits a particular vulnerability. The probe handler selectively performs one of multiple customizable corrective actions, thereby securing the application until an applicable software patch can be installed.
Owner:IBM CORP

Flexible instruction processor systems and methods

A design system for generating configuration information and associated executable code based on a customisation specification, which includes application information including application source code and customisation information including design constraints, for implementing an instruction processor using re-programmable hardware, the system comprises a template generator for generating a template for each processor style identified as a candidate for implementation; an analyser for analysing instruction information for each template and determining instruction optimisations; a compiler for compiling the application source code to include the instruction optimisations and generate executable code; an instantiator for analysing architecture information for each template, determining architecture optimisations and generating configuration information including the architecture optimisations; and a builder for generating device-specific configuration information from the configuration information including the architecture optimisations. In another aspect, a management system for managing run-time re-configuration of an instruction processor implemented using re-programmable hardware, comprises a configuration library containing configuration information for a plurality of instruction processor implementations; a code library for containing associated executable code for the implementations; a loader for loading application data and, as required, configuration information and associated executable code into re-programmable hardware for implementation and execution of an instruction processor; a loader controller for signalling the loader to load application data and, as required, configuration information and associated executable code, and execute the executable code; a run-time monitor for obtaining run-time statistics relating to operation of the instruction processor; an optimisation determiner configured to receive the run-time statistics, and being operable to instruct the loader to load new configuration information and associated executable code for a new implementation into the re-programmable hardware; and an optimisation instructor for invoking the optimisation determiner.
Owner:LUK WAYNE +2

Automated tagging and tracking of defect codes based on customer problem management record

A routine for tagging and tracking source code may be implemented in a software development environment. The routine begins upon the identification of a defect in a software product or system. Once the defect has been identified and rectified, a search of other source code (typically located in a source code management system that supports version control) is specified. Using the search specification, the system automatically identifies the code snippet to be searched and begins searching the identified codebase for duplicates. A ticket or service record is then created for every duplicate / similar code snippet found during the search. The ticket / record enables software defect tracking to be carried out on the newly-located instances of the code. The system also automatically manages the code snippets identified by the duplicate detection.
Owner:IBM CORP

Code snippet recommendation method based on sequence-to-sequence model

The invention discloses a code snippet recommendation method based on a sequence-to-sequence model. The method comprises the steps of collecting and cleaning code snippets and corresponding queries; extracting code information; performing an identifier replacement operation on the code snippets; combining the code snippets after the identifier replacement operation and the corresponding queries into a set of (code, query) pairs, and taking the set as a training set of a query generation model; training a query generation model by using the sequence-to-sequence model; generating a query for thecode snippets of the recommendation code library; inputting a query, and executing similarity calculation between the query and the generated query; and according to a similarity calculation result,constructing a generated query list according to a descending order of similarity scores, and retrieving code snippets corresponding to queries in the list from a recommendation code library to serveas code snippet recommendation results. The method is superior to some existing research works, the code snippet recommendation effect can be effectively improved, and the software development efficiency is improved.
Owner:NANJING UNIV OF AERONAUTICS & ASTRONAUTICS

Method and system for updating program versions in servers

The invention relates to the field of Internet, and discloses a method for updating program versions in servers. The method comprises the following steps: S1, acquiring branches of a code library, and acquiring configuration items associated with the branches; S2, establishing connections with one or more servers in the code library according to the addresses of the servers in the acquired configuration items; S3, traversing files in the servers which are connected with the code library, judging whether a single server includes feature files for indicating version number information of a current version of a program in the server or not, and updating all or a part of latest version files to file uploading lists corresponding to the servers; S4, deploying the files in the file uploading lists into the corresponding servers. The invention further discloses a system for updating the program versions in the servers. The method and the system have high program updating processes, and support simultaneous program updating of a plurality of servers.
Owner:WUHAN DOUYU NETWORK TECH CO LTD

Method for detecting cryptology misuse of Android application programs

The invention discloses a method for detecting cryptology misuse of Android application programs. The method comprises the following steps of decompiling a to-be-detected program and generating a codebase; then, looking up code segments related with a cryptographic algorithm from the codebase; then, stripping the code segments related with the cryptographic algorithm out of an original program to obtain a complete cryptographic algorithm implementation process code; finally, performing data abstraction and process modeling processing on each cryptographic algorithm implementation process code segment obtained in the step 3; comparing the cryptographic algorithm implementation process code segments item by item through pattern matching and a cryptographic algorithm implementation rule appointed in advance, outputting items which do not meet the implementation rule and summarizing to form a safety analysis result. According to the method disclosed by the invention, through static analysis on an Android application program, a cryptographic algorithm type used in the application program can be automatically judged, and the code segments related with the cryptographic algorithm are automatically extracted; safety analysis is performed on the code segments so as to find out a problem link during a cryptographic algorithm implementation process, and the safety analysis result of the cryptology misuse of the application program is finally obtained.
Owner:SHANGHAI JIAO TONG UNIV +1

Code merging method and related equipment for supporting application parallel development

The invention discloses a code merging method and related equipment for supporting application parallel research and development, wherein, the method comprises the following steps: collecting information of an application program to be developed, and generating an application program ID corresponding to the application program to be developed according to the information of the application programto be developed; Creating a requirement list of a corresponding application to be developed based on the application ID, adding requirement information to the requirement list, and configuring a codebase corresponding to the requirement information; searching code base corresponding to each requirement information of an application to be developed based on the application ID, and merging codes in the searched code base to obtain a merged code base. As that ID is generate by the application program to be researched and developed, the invention realizes that the application program is distinguished by the ID, the management of the application program is convenient, and the code base corresponding to each requirement of each application program is simultaneously merged based on the ID of the application program, thereby saving the cost of code merging.
Owner:BEIJING 58 INFORMATION TECH

Automated Compiler Specialization for Global Optimization

InactiveUS20140026127A1Little compilerLittle link-time overheadProgram controlCompiler constructionGlobal optimizationStatic analysis
Techniques are provided herein for the offline static analysis of a stable code base in order to build a compiler and tools specialised to that code base. This allows global code base knowledge to be applied earlier in the compilation process giving better opportunities for optimisation. The offline static analysis produces specialized compiler components that are then used to rebuild the compiler. This results, over time, in a compiler specialized to the code base with improved optimization after every compiler release cycle.
Owner:MSTAR SEMICON INC +1

A compiling method and device for code files

The invention provides a compiling method and device for code files. The compiling method is applied in a first compiling server. The method comprises the steps of parsing a first identifier carried by an acquired package from the same; downloading a code file corresponding to the first identifier from a first code library server according to the first identifier; determining a compiling script corresponding to the first identifier based on the first identifier and a preset compiling script list; compiling the package and the code file via the compiling script to obtain a compiling result. According to the embodiments, when there are too many to-be-compiled code files for different functional requirements, the accuracy of compiling results can be increased and compiling error can be reduced.
Owner:HANGZHOU DPTECH TECH

Method, device and system for generating code documents in continuous integration

Embodiments of the invention disclose a method, device and system for generating code documents in continuous integration. The method comprises the following steps of: obtaining a code and a code annotation submitted by a user; judging whether the code annotation is correct or not according to the code; if the judging result is positive, storing the code and the code annotation into a code library and executing the next step; if the judging result is negative, returning prompt information; obtaining a code structure and the code annotation, and recording the code structure and the code annotation into a source file; and generating the source file into a code document according to a preset configuration file. According to the method, the code and the code annotation submitted by the users are verified to ensure the consistency between the code annotation and the code; after the verification passes, the source file is generated according to the code structure and the code annotation, submitted by a worker, of the code; and the source file is generated into the code document according to the preset configuration information. According to the method, device and system disclosed by the invention, the automatic generation and timely updating of code documents are realized, so that the manpower resources are saved, and the working efficiency and the correctness of the code documents are improved.
Owner:ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products