Patent classifications
G06F9/44589
Integrated code inspection framework and check variants
An integrated code inspection framework using check variants is provided herein. Integrated code inspection can include associating a check variant with a development object in a development project. Additionally, a check variant can be associated with a development project. A check variant associated with a development project can cascade to development objects in the development project. A check variant associated with a development object can cascade to related development objects, based on their hierarchical relationship. A check variant can be executed against a development object to identify code which triggers check rules of the check variant. The check variants executed can come from the development project or related development objects based on the cascade of check variants. Results of the code inspection via the check variants can be aggregated and displayed in a user interface, and integrated with the code of a development object.
Real-time configuration check framework
A computer-implemented method receives a program code and a signature associated with the program code from a database persistency associated with an enterprise threat detection (ETD) system. The received program code is associated with a configuration check, and the configuration check is developed at a development computing system and can collect information associated with a computing system. The received program code and the signature associated with the program code is distributed to a plurality of computing systems that are monitored by the ETD system. At least one configuration check result is received, and the configuration check result is generated by executing the program code on the computing system. The at least one configuration check result then transmitted to the database persistence, and the at least one result is displayed on a database graphical user interface (GUI) associated with the database persistency.
Software deployment control using blockchain
A method for controlling the deployment of a software application may include responding to a user committing a programming code implementing the software application by determining whether the programming code passed a plurality of tests required for deploying the programming code to a production system. In response to determining that the programming code passed the plurality of tests, one or more blocks indicating that the programming code has passed the plurality of tests may be inserted into a blockchain. The programming code may be deployed to the production system. The deploying of the programming code may include traversing the blockchain to verify a presence of the one or more blocks in the blockchain. Related systems and articles of manufacture, including computer program products, are also provided.
Database-driven zero downtime data migration
A system and method providing database level migration of an application and associated data. In one embodiment, the method may include deploying a new data structure, a first database trigger to capture data written to an old data structure and to write the captured data to the new data structure, and a bulk migration stored procedure to a database instance; deploying, in response to a conclusion of an execution of the bulk migration stored procedure, a second database trigger to the database instance to capture data written to the new data structure and to write the captured data to the old data structure; deploying a second version of the application; routing validation data to the second version of the application to validate an expected operation thereof; and routing, in response to a completion of the validation, production data for the database instance to the second version of the application.
SYSTEMS AND METHODS FOR ACTION VALIDATIONS
Disclosed are systems and methods for validations related to software. In some embodiments, a method for building software with software action validations, the method comprising: accessing a target object type, the target object type comprising one or more object properties; accessing an action type, the action type comprising one or more action parameters, the action type associating with editing a target object of the target object type; generating a set of validation rules associated with the action type, wherein the set of validation rules comprise a local validation rule associated with a rule parameter; and building a software application, wherein the software application comprises the target object type, the action type, and the set of validation rules.
System, method, and computer program product for customizing functions of a point-of-sale terminal
Described are a system, method, and computer program product for customizing functions of a point-of-sale (POS) terminal. The method includes receiving payment device data from an electronic payment device of a user during a payment transaction between the user and a merchant. The method also includes receiving at least one script for execution on the POS terminal from the electronic payment device. The at least one script is associated with a digital signature. The method further includes verifying the at least one script based on the digital signature of the at least one script and executing the at least one script on the POS terminal to cause an action associated with a user interaction with the POS terminal to be performed.
Secure embedded system and method of making secure
The invention relates to an embedded system (1) comprising a processor (2) operated by means of a kernel (3) executable by said processor, a hardware peripheral (8, 9), a memory (5) and an application-related software program (6) recorded in said memory (5), said application-related software program (6) being executed by means of said kernel (3) executable by said processor (2), as well as a securing method. The invention is characterized in that the kernel (3) executable by said processor (2) controls said hardware peripheral (8, 9), obliges said application-related software program (6) to execute a policy, which is neither defined nor controlled by said program, for controlling access to said communication peripheral (8, 9), and is formally proven to satisfy at least one security property.
Using embedded elements for online content verification
A computerized method of content verification comprising using a server for receiving a first data from a host monitoring code embedded in a webpage or an application loaded from a content server and executed by a client device, the host monitoring code is executed by the client device during an execution of the webpage or the application which further embeds nesting element(s) for loading nested content from nested content server(s), the first data is indicative of the execution, receiving a second data indicative of the execution from a guest monitoring code embedded in the nested content, combining the first data and second data for compliance verification of the execution with one or more rules associated with the nested content and initiating action(s) according to the verification. Wherein the first data is not available to the guest monitoring code and the second data is not available to the host monitoring code.
Systems and Methods for Preparing Cross-Platform Machine Learning Applications
The technology disclosed relates to systems and methods of cross-platform programming of tiny machine learning (ML) applications. The method includes providing a first declarative instruction that, when processed, interacts with a cross-platform capability of tiny ML hardware. The method includes providing a second declarative instruction that, when processed, invokes at least one procedure block. The method includes providing a third declarative instruction that, when processed, causes output from the tiny ML hardware. The method includes compiling the ML procedure block and the tiny ML model into bytecode. The bytecode interacts, via a virtual machine (VM) layer, with the capability to produce the output responsive to the first, second and third declarative instructions. The method includes executing the bytecode on the tiny ML hardware to process the declarative instructions without recompilation of the bytecode to adapt to alternative instances of the tiny ML hardware, each running its alternative VM layer.
METHOD AND MICROCONTROLLER FOR DRIVING IN-SYSTEM-PROGRAMMING
A method for driving in-system programming is provided. The method includes receiving a set of driving codes; setting an in-system-programming flag according to the set of driving codes; executing a system reset after the in-system-programming flag is set; detecting whether there is an in-system-programming flag after the system reset is finished; and executing an in-system-programming procedure when an in-system-programming flag is detected.