Patent classifications
G06F8/40
Automated security policy generation for controllers
In one implementation, a method for automatically generating a security policy for a controller includes receiving, by a security policy generation system and from a controller development environment, code for a device controller; selecting middleware that enforces a security policy; analyzing the code for the device controller; based at least in part on the analyzing, automatically generating the security policy; and providing the selected middleware along with the generated security policy.
AUTOMATED SECURITY POLICY GENERATION FOR CONTROLLERS
In one implementation, a method for automatically generating a security policy for a controller includes receiving, by a security policy generation system and from a controller development environment, code for a device controller; selecting middleware that enforces a security policy; analyzing the code for the device controller; based at least in part on the analyzing, automatically generating the security policy; and providing the selected middleware along with the generated security policy.
AUTOMATED SECURITY POLICY GENERATION FOR CONTROLLERS
In one implementation, a method for automatically generating a security policy for a controller includes receiving, by a security policy generation system and from a controller development environment, code for a device controller; selecting middleware that enforces a security policy; analyzing the code for the device controller; based at least in part on the analyzing, automatically generating the security policy; and providing the selected middleware along with the generated security policy.
CONTROL METHOD, ANALYSIS DEVICE, AND RECORDING MEDIUM
A control method of an analysis device includes analyzing a binary code of each of a plurality of smart contracts stored in a first distributed ledger; obtaining, by using a result of the analyzing, items of commonization information expressing, in a common format, items of information provided by the plurality of smart contracts; and generating transaction data that includes the items of commonization information obtained and performing control of storing the transaction data generated into a second distributed ledger.
DETERMINISTIC MEMORY ALLOCATION FOR REAL-TIME APPLICATIONS
Deterministic memory allocation for real-time applications. In an embodiment, bitcode is scanned to detect calls by a memory allocation function to a dummy function. Each call uses parameters comprising an identifier of a memory pool and a size of a data type to be stored in the memory pool. For each detected call, an allocation record, comprising the parameters, is generated. Then, a header file is generated based on the allocation records. The header file may comprise a definition of bucket(s) and a definition of memory pools. Each definition of a memory pool may identify at least one bucket.
FAST PORTING OF PROJECTS
Aspects of the invention include systems and methods configured to efficiently evaluate the efforts of a code migration (e.g., porting task) between different platforms. A non-limiting example computer-implemented method includes receiving a function of a source platform. The function can include a plurality of fields. An initial vector is constructed for each of the plurality of fields. The initial vector encodes a value of the respective field according to an encoding rule. The initial vectors are merged into a single final vector and the final vector is classified into one of a plurality of system function families of the source platform. A vector of a target platform at a minimum distance to the final vector is identified and an assessment is provided that includes a difficulty in porting a project comprising the function between the source platform and the target platform based at least in part on the minimum distance.
COMMAND SCRIPT EDITING METHOD, COMMAND SCRIPT EDITOR AND GRAPHIC USER INTERFACE
A command script editing method, a command script editor and a graphic user interface are provided. The command script editing method includes the following steps. The command node is edited according to at least one inputting action or at least one image identifying action performed on the operation frame when the command script editor is at an image editing mode. The command node is edited according to a setting content of at least one process action when the command script editor is at a process editing mode.
SCRIPTING LANGUAGE COMPUTER PROGRAM MODIFICATION METHODOLOGY, SYSTEM AND SOFTWARE
A method, system, and software for adding to, extending or otherwise modifying a pre-existing computer program, written in a scripting language, with a new source code, written in a scripting language, without the need to sham underlying source code of the pre-existing computer program or the newly modified source code.
SCRIPTING LANGUAGE COMPUTER PROGRAM MODIFICATION METHODOLOGY, SYSTEM AND SOFTWARE
A method, system, and software for adding to, extending or otherwise modifying a pre-existing computer program, written in a scripting language, with a new source code, written in a scripting language, without the need to sham underlying source code of the pre-existing computer program or the newly modified source code.
Coding system and coding method using voice recognition
The present invention relates to a system and a method for coding. In the present invention, the user may simply process the work of coding using various programming languages on Cloud without a need for the user to use a separate input device, by recognizing oral commands spoken by the user and carrying out the natural language processing comprising morphological analysis, syntactic analysis, semantic analysis, discourse analysis or combinations thereof, and creating and executing the programming code based thereon.