Patent classifications
G06F11/3688
Systems and Methods for Security and Risk Assessment and Testing of Applications
Provided herein are systems and methods for monitoring and assessing the security and risk presented by applications deployed in a complex computing environment. An exemplary application security system an application security server having a processing device in communication with one or more storage systems and includes a security testing system with a plurality of security test modules. The test modules include a first module associated with a first application associated with one or more application instances configured to receive and transmit over a network. The processing device calculates a security risk score for the first application based on information about the first application, determines a security priority level associated with first application, the security priority level of the first application being based on the security risk score for the first application, and associates the security priority level of the first application with the first application in a database of application security information.
METHOD AND DEVICE FOR AUTOMATIC TESTING
A method for automatic testing of a piece of software for a mobile device including the following steps: deriving from a description a formalized description, the description includes possible sequences of events of the software and a range for at least one input parameter of the software, the description being used for an implementation of the software; generating from the formalized description a test description; adapting the test description for the mobile device for which the software is to be tested; translating the test specification in a language assigned to the mobile device such that a test described by the test specification can be performed on the mobile device. The method for automatic testing further relates to a corresponding device.
Self-healing hybrid element identification logic
A system and method for receiving, using one or more processors, a first testing identifier associated with a first element of an application under test; receiving, using the one or more processors, a second testing identifier associated with the first element of an application under test; evaluating, using the one or more processors, the first testing identifier; determining, using the one or more processors, a failure of the first testing identifier to identify an element in the application under test; evaluating, using the one or more processors, the second testing identifier; identifying, using the one or more processors, the first element in the application under test based on the second testing identifier; and repairing, using the one or more processors, the first testing identifier to identify the first element in the application under test.
METHODS AND APPARATUS TO ELIMINATE PARTIAL-REDUNDANT VECTOR LOADS
Methods, apparatus, systems and articles of manufacture are disclosed to eliminate partial-redundant vector load operations. An example apparatus includes a node grouper to associate a vector operation with a node group, a candidate verifier to perform a dependencies test on a subset of the node group, and identify a subset of the node group as a candidate when the subset satisfies the dependencies test, and a code optimizer to determine replacement code based on a characteristic of the candidate in the node group and compare an estimated cost associated with executing the replacement code to a threshold. The example apparatus also includes a code generator to generate machine code using the replacement code when the estimated cost of executing the replacement code satisfies the threshold.
Generation, administration and analysis of user experience testing
Systems and methods for generating, administering and analyzing a user experience study are provided. In particular, intents can be generated from a user experience study by applying one or more screener questions to participants and subjecting the screened participants to one or more tasks. Corresponding clickstreams and success data for each participant engaging in the tasks can be recorded. The success and clickstream data can also be aggregated for all the screened participants as aggregated results. Video data including audio for each of the screened participants can also be recorded.
Method for Testing a Graphical Interface and Corresponding Test System
This test method for validating a specification of a graphical interface consists of developing a scenario file corresponding to the validation test to be performed. The scenario file includes a plurality of instructions, in a natural programming language, each instruction including a function, parameters and an expected state of the graphical interface following the application of the function. The test is automatically performed by interpreting the scenario file so as to generate commands intended for an engine capable of interacting with the graphical interface and monitoring the evolution of its current state, and then analyzing a result file associating each instruction of the scenario file with a result corresponding to the comparison of the current state of the graphical interface following the application of the corresponding command with the expected state.
Method for testing a microservice application
Provided is a method for testing a microservice application with at least one microservice with at least one application programming interface, including: reading characteristic data of the application programming interface of the microservice of the microservice application and ascertaining at least one endpoint of the application programming interface; automatically generating an execution script on the basis of the characteristic data of the application programming interface; automatically generating a test infrastructure, wherein the test infrastructure includes at least one client entity; executing the execution script and transmitting the data query of the execution script by the client entity to the application programming interface of the microservice and receiving corresponding response data of the microservice by the client entity; and ascertaining the transfer characteristic by the client entity.
Method and apparatus for verifying operation state of application
A method and an apparatus for verifying an operation state of an application are provided. The method can include setting target verification operation information according to an operation verification item of an application to be verified; setting a verification process instruction for the target verification operation information; encapsulating the verification operation information and the verification process instruction as fault injection data, and sending the fault injection data to a data input port of the application to be verified; matching the process feedback information with the verification process instruction in response to receiving the process feedback information corresponding to the fault injection data, and determining executed target verification operation information.
COMPANION TESTING FOR BODY-AWARE DEVICES
One embodiment provides a method, including: receiving movement data describing physical movement of a person performing a predetermined action; generating, using a processor, classification of the movement data using a test application that predicts output of a wearable device, wherein the test application has been formed using previously collected data that describe the movement of a person performing the predetermined action; determining, using the processor, whether the movement data match the predetermined action in view of the classification; receiving output of a body-aware application that detects and responds to human movement; comparing, using the processor, the output of the body-aware application with the classification; and providing, using the processor, an indication of the comparing of the output of the body-aware application and the classification.
Workflows for automated operations management
Techniques are disclosed relating to automated operations management. In various embodiments, a computer system accesses operational information that defines commands for an operational scenario and accesses blueprints that describe operational entities in a target computer environment related to the operational scenario. The computer system implements the operational scenario for the target computer environment. The implementing may include executing a hierarchy of controller modules that include an orchestrator controller module at top level of the hierarchy that is executable to carry out the commands by issuing instructions to controller modules at a next level. The controller modules may be executable to manage the operational entities according to the blueprints to complete the operational scenario. In various embodiments, the computer system includes additional features such as an application programming interface (API), a remote routing engine, a workflow engine, a reasoning engine, a security engine, and a testing engine.