Patent classifications
G06F11/362
Self-debugging
In overview, methods, computer programs products and devices for securing software are provided. In accordance with the disclosure, a method may comprise attaching a debugger process to a software process. During execution of the software process, operations relevant to the functionality of the code process are carried out within the debugger process. As a result, the debugger process cannot be replaced or subverted without impinging on the functionality of the software process. The software process can therefore be protected from inspection by modified or malicious debugging techniques.
Data storage device restoring method
A data storage device restoring method is provided, which is adapted to a data storage device. The data storage device includes an SSD controller, a power management circuit, a non-volatile memory, and a reset circuit. The data storage device restoring method includes: the power management circuit determines whether a normal signal from the SSD controller is received within a predetermined time; if not, the power management circuit resupplies power to the data storage device but stops supplying power to the non-volatile memory, thereby the SSD controller stays in a read-only memory mode to automatically execute the data storage device restoring process.
Intelligent control system and method of thin plate drier for cut tobacco
An intelligent control system and method of thin plate dryer for cut tobacco are provided. The system includes a factor searching and screening unit, a control unit, an early warning unit. The control unit adopts a dual-model control method and establishes a process parameter control model and an energy balance model, the control unit calculates the moisture discharge opening value in real time according to the dual-model; the early warning unit is configured to connected with the control unit, and send out an alarm information based on early warning signal. The present disclosure is designed to transform the traditional control into intelligent precision control, improve product quality, reduce product differences between batches and build an intelligent early warning function.
AUTOMATED GENERATION OF PRIVACY AUDIT REPORTS FOR WEB APPLICATIONS
Various embodiments comprise systems and methods to generate privacy audit reports for web applications. In some examples a computing system comprises a data extraction component, a risk assessment component, and an exposure component. The data extraction component crawls a web application and identifies data, data exposure points, and security policies implemented by the web application. The risk assessment component generates a risk score for the web application based on the amount data, the data sensitivity, the amount and type of data exposure points, and the security policies. The risk assessment component generates the privacy audit report for the web application. The privacy audit report comprises the risk score, an inventory of data types, an inventory of the data exposure points, and a graphical representation of historical risk scores. The exposure component transfers the privacy audit report for delivery to an operator of the web application.
Systems and methods for developing digital experience applications
In one implementation, systems and methods are provided for developing a computer-implemented digital experience application having a first and a second micro-application. Each micro-application includes a front end interface configured to receive and display information. The first micro-application includes a first event manager configured to detect an application event belonging to a category, and a first state manager configured to detect an application state belonging to the category. The digital experience application further includes a driver application configured to host the first and second micro-applications, an event hub configured to receive the detected application event from the first micro-application, and a state store configured to store the detected application state received from the first micro-application. The second micro-application includes a second event manager configured to receive the detected application event from the event hub, and a second state manager configured to receive the detected application state from the state store.
DEBUGGING STREAMING APPLICATIONS USING DEBUG REGIONS
A method for debugging a streaming application is provided. The method may include establishing, by a processor, a debug region in the streaming application to mark a subgraph for debugging. The method may further include receiving a tuple flow suspension notification from a job control plane. The method may also include displaying a plurality of debugging options for debugging a streaming application on a graphical user interface based on the received tuple flow suspension notification. The method may further include determining a debugging option from the displayed plurality of debugging options based on a user selection on the graphical user interface. The method may also include translating the determined debugging option into a format compatible with the job control plane. The method may further include transmitting the translated debugging option to the job control plane.
PROVIDING DEBUG INFORMATION ON PRODUCTION CONTAINERS USING DEBUG CONTAINERS
A method and associated system for providing debug information associated with computer software executing in a production container. The production container is replicated as a debug container. The computer software is executed in the production container and the debug container. Executing the computer software includes replicating requests sent to the computer software executing in the production container to the computer software executing in the debug container. Requests from the computer software executing in the production container are stored together with any responses to the stored requests. Debug information generated by the computer software executing in the debug container is stored.
Dynamic CFI using line-of-code behavior and relation models
Disclosed herein are techniques for analyzing control-flow integrity based on functional line-of-code behavior and relation models. Techniques include receiving data based on runtime operations of a controller; constructing a line-of-code behavior and relation model representing execution of functions on the controller based on the received data; constructing, based on the line-of-code behavioral and relation model, a dynamic control flow integrity model configured for the controller to enforce in real-time; and deploying the dynamic control flow integrity model to the controller.
ZERO FOOTPRINT ROBOTIC PROCESS AUTOMATION SYSTEM
Computerized RPA methods and systems that increase the flexibility and lower the cost with which RPA systems may be deployed are disclosed herein. In one embodiment, an RPA system and method avoids the need for preinstalled RPA software on a device employed by a user to create and/or execute software robots to perform RPA. In another embodiment, an RPA system and method provides a capability to execute software robots that may have been encoded in one or more programming languages to execute on an operating system different than that employed by a server of the RPA system.
Data collection configuration file generation
A network monitoring system may receive a configuration request to generate a configuration file associated with collecting feature or debug data associated with a feature, hardware, or software associated with a network device. The network monitoring system may determine a command profile associated with the feature, hardware, or software that identifies a set of commands associated with obtaining the feature or debug data from the network device. The network monitoring system may determine respective parameters of one or more commands of the set of commands. The network monitoring system may determine, based on the respective parameters, respective arguments of the one or more commands. The network monitoring system may generate the configuration file based on the respective arguments and may perform an action associated with the configuration file to permit the configuration file to be used to collect the feature or debug data from the network device.