Format preserving encryption of object code

    公开(公告)号:US10452564B2

    公开(公告)日:2019-10-22

    申请号:US15496287

    申请日:2017-04-25

    Abstract: Format preserving encryption of object code is disclosed. One example is a system including at least one processor and a memory storing instructions executable by the at least one processor to identify object code to be secured, where the object code comprises a list of instructions, each instruction comprising an opcode and zero or more parameters. A format preserving encryption (FPE) is applied to the received object code, where the FPE is applied separately to a sub-plurality of instructions in the list of instructions, to generate an encrypted object code comprising a sub-plurality of encrypted instructions. An encrypted object code is provided to a service provider, where the encrypted object code comprises the sub-plurality of encrypted instructions, and any unencrypted portions of the object code.

    DETERMINING PSEUDONYM VALUES USING TWEAK-BASED ENCRYPTION

    公开(公告)号:US20190294821A1

    公开(公告)日:2019-09-26

    申请号:US15926425

    申请日:2018-03-20

    Abstract: A technique includes accessing data that represents a plurality of values that are associated with a plurality of ranges. The technique includes determining a pseudonym value for a given value, where the given value is associated with a given range and determining the pseudonym includes encrypting the given value to provide the pseudonym value; controlling the encryption to cause the pseudonym value to be within the given range; and tweaking the encryption based on an attribute that is associated with the given value.

    Dynamic lexer object construction
    124.
    发明授权

    公开(公告)号:US10365901B2

    公开(公告)日:2019-07-30

    申请号:US15752021

    申请日:2015-08-14

    Abstract: In one example in accordance with the present disclosure, a method for dynamic lexer object construction includes receiving a grammar rule including a variable and a Boolean function to be performed on a character sequence using the variable. The method includes receiving the character sequence and a value corresponding to the character sequence and constructing a lexer object that includes the value as the variable used by the Boolean function. The method includes parsing the character sequence using the lexer object.

    Static program analysis in an object-relational mapping framework

    公开(公告)号:US10331894B2

    公开(公告)日:2019-06-25

    申请号:US15500532

    申请日:2014-08-29

    Abstract: Example implementations relate to static program analysis. For example, an apparatus includes a processor to perform static program analysis on a set of processor executable instructions associated with an object-relational mapping (ORM) framework. The first set of processor executable instructions includes an object. The processor is also to generate a propagation path of the object based on an execution flow of the object. The propagation path includes a first node and a second node. The first node corresponds to a first ORM operation to store the object in a database. The second node corresponds to a second ORM operation to retrieve the object from the database. The second node is linked to the first node based on a common attribute of the object. In response to a determination that the propagation path includes a sink, the processor is to output a security risk warning.

    Application testing
    126.
    发明授权

    公开(公告)号:US10324829B2

    公开(公告)日:2019-06-18

    申请号:US15747297

    申请日:2015-07-30

    Abstract: Application testing is disclosed in the present disclosure. An interface structure may be extracted from source code of an application under test (AUT), and the interface structure may be separated into subsections. Then a primary test may be performed for the AUT by using test code to execute the subsections. An assertion strategy in the test code may be evaluated based on a predefined assertion requirement to obtain a first measurement result of the AUT, in which the assertion strategy may be to assert an execution result of the test code executing the subsections.

    SORT FUNCTION RACE
    127.
    发明申请
    SORT FUNCTION RACE 审中-公开

    公开(公告)号:US20190102483A1

    公开(公告)日:2019-04-04

    申请号:US15721157

    申请日:2017-09-29

    Inventor: Pramod G. Joisha

    Abstract: In one example, a system for a sort function race can include a processor, and a memory resource storing instructions executable by the processor to generate a plurality of variant sort functions that utilize a variant of an input from a parent sort function, that perform the plurality of variant sort functions as a plurality of separate processes, identify a variant sort function from the plurality of variant sort functions that completes a function in a shortest period of time, and receive results from the identified variant sort function.

    Code coverage information
    128.
    发明授权

    公开(公告)号:US10248548B2

    公开(公告)日:2019-04-02

    申请号:US15560571

    申请日:2015-04-15

    Abstract: A technique includes obtaining code coverage information related to lines of code. The code coverage information indicates how the lines of code are covered by a plurality of tests. The technique includes generating a two-way mapping based on the code coverage information. The two-way mapping includes a first mapping that maps a particular test in the plurality of tests to at least one line in the lines of code, which is covered by the particular test; and a second mapping that maps a particular line of code in the lines of code to at least one test in the plurality of tests, which covers the particular line of code.

    TWEAK-BASED STRING ENCRYPTION
    129.
    发明申请

    公开(公告)号:US20190068358A1

    公开(公告)日:2019-02-28

    申请号:US15693327

    申请日:2017-08-31

    Abstract: A technique includes performing element-by-element encryption of a segment of the plaintext string to provide a segment of an encrypted string. Performing the element-by-element encryption includes, for a given string element of the segment of the plaintext string, encrypting the given string element to provide a given string element of the segment of the encrypted string; and tweaking the encryption of the given string element based on a selector that includes multiple string elements of the encrypted string. The technique may include searching an encrypted database based on the encrypted string.

Patent Agency Ranking