Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

62 results about "Software assets" patented technology

Asset management software is a software product designed to help people keep track of their assets. This software can be used by both businesses and individuals. A number of software companies make programs of this nature, including versions designed for special applications.

Auditing smart contracts configured to manage and document software audits

Provided is a process that includes: calling an audit smart contract with a request to indicate whether an audit requirement has been satisfied for a software asset, wherein: the audit smart contract is configured to access a trust record published in a blockchain to determine whether the audit requirement has been satisfied, the trust record is caused to be published to the blockchain by an auditing entity that performed the audit, the trust record contains a cryptographically signed indication of an identity of an auditing entity that performed the audit, a result of the audit that specifies whether the audit was passed by the software asset, and a hash digest of the software asset upon which the audit was performed, wherein the audit smart contract is configured to determine whether the trust record establishes that the audit requirement has been satisfied.
Owner:CA TECH INC

Method for converting TCP network communication server into client

The invention relates to a method for converting a transmission control protocol (TCP) network communication server into a client. The method comprises the following steps of: establishing a forwarding server providing data forwarding in a TCP network, and establishing connection between at least one internal network server machine and the forwarding server through a command port and a data port;establishing connection between at least one external network client machine and the forwarding server through the command port and the data port; and setting the internet protocol (IP) address of the TCP network, the command port and the data port in the forwarding server, wherein the forwarding server monitors the command port and the data port all the time. The forwarding server is used for service registry, service query, communication relay and the like; the internal network server machine does not directly expose services for an external network, so the security of the internal network is improved, fixed IP configuration is not needed, and precious resource of fixed IP is reduced; and because the method is a TCP communication forwarding-based general realization method, the conventional server software and client software do not need modifying, and the conventional software assets can be fully utilized.
Owner:BEIJING DAYANG TECH DEV

Consistent Method System and Computer Program for Developing Software Asset Based Solutions

A method, computer program and system for consuming reusable software assets, said assets being described with elements and attributes, said assets containing at least one variable element (VPs) themselves containing at least one variant. The user executes a program on a computer by first choosing the asset to be consumed. A decision tree corresponding to the asset is traversed, each decision point corresponding to a variable element. The decision point is processed by asking the user inputs to modify the variants of the corresponding variable elements. The modified variable elements are stored. The dependency of the decision point is indicated by a dependency attribute in the variable element.The program can stop at the initiative of the user or when the decision tree is completely traversed. When the decision tree has been partially traversed, the program can be restart after the last decision point processed starting from the partially modified corresponding variable element.
Owner:IBM CORP

Software risk assessment method based on defect analysis

ActiveCN103366123AOvercoming Risk Double Counting ProblemsRisk Double Counting Problem AvoidancePlatform integrity maintainanceRisk levelRisk rating
The invention discloses a software risk assessment method based on defect analysis. The risk assessment method comprises the following steps of obtaining input data and an input relationship required by risk calculation through software asset identification, the defect analysis and consequence attribute evaluation, calculating consequence attribute factors of consequence attributes in functional modules, calculating risk degrees sumRtk of consequences of whole software, calculating weighted means of the risk degrees of the consequence attributes according to weights (pwti) of the functional modules of the software, obtaining the risk degrees sumRtk of the consequence attributes of the whole software, calculating a whole risk value of the software, calculating weighted means of the risk degrees of the consequence attributes of the whole software according to weights (rwtk) of the consequence attributes, obtaining a final risk value Risk of the software, evaluating a risk level, and obtaining the risk level of the software as an assessment result according to the risk value Risk of the software. The method solves the problems that risk element assignments in most risk assessment models relate to more expert opinions at present, and some assignments are unquantifiable. The method avoids repeated risk calculation to the greatest extent.
Owner:TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products