Method for software verification in distributed computer complexes and system for its realisation

FIELD: information technologies.

SUBSTANCE: invention is related to facilities of training and science research automation and may be used in interactive systems of research and development works automation in process of software (SW) verification in distributed computer complexes (DCC). Suggested method and system for its realisation provide complete manageability and observability of the main processes of SW initial code verification. At the same time at each level of DCC processes of SW initial code input and processing are combined along dependent or independent interface channels, on the basis of application of sensor or mechanical manipulators of computer operator workplace, network interfaces of local or global network Sections or points of SW initial code vulnerability are defined on the basis of SW initial code transformation into internal representation, which is stored in the form of databases and knowledge bases, and sections or points of SW initial code vulnerability are defined on the basis of automatic making and solving of according equation systems.

EFFECT: expansion of functional resources of DCC SW verification processes

9 cl, 40 dwg, 26 tbl

 

The text descriptions are given in facsimile form.

1. Method verification software) distributed computing systems (Mer) includes at each i-th level of verification FOR (i=0, 1,..., I, I - the number of levels of verification BY RVC) the combination is of Rzeszow input and processing source code of the software on a dependent or independent channels, based on sensory or mechanical manipulators (keyboard, mouse, joystick etc) workplace computer operator, network interfaces LAN or WAN, and the areas or points of vulnerability source code is determined on the basis of converting source code into an internal representation, which is stored in the form of databases and knowledge bases, and points or areas of vulnerability source code on each i-th level of verification BY RVC is determined on the basis of automatic writing and solving the corresponding systems of equations, with each i-th level of verification BY RVC carry out the generation of databases data based on reports about detected vulnerabilities in the source code of the software, and the generation of knowledge bases is carried out on the basis of the use of annotations external functions source code (IR) RVC, while the knowledge base is a set of rules or models of protocols verification IR ON, providing support for interactive processes to identify vulnerabilities.

2. The method according to claim 1, characterized in that the internal representation of the source code in the programming language C for each i-th level of verification BY RVC represented as dynamic arrays and associated databases and knowledge bases that are used in real-time on what I verification ON distributed computing systems.

3. The method according to claim 1, characterized in that as dependent channels on each i-th level of verification BY RVC use interfaces hard, floppy or optical disk.

4. The method according to claim 1, characterized in that as an independent channels for each i-th level of verification BY RVC use the serial port or network interface.

5. The method according to claim 1, characterized in that at each i-th level of verification BY RVC as an independent channels use the serial port or network interface, and as dependent channels use interfaces hard, floppy or optical disk.

6. The method according to any one of claims 1 to 5, characterized in that the reports about detected vulnerabilities in the source code of the software include:
field guidance on the location of potential vulnerabilities in the source code of the program, including the file name of the program listing, the line number and the position number in the row of the program in which it is possible buffer overflow computer storage devices, the context of the source program containing a possible overflow or some "neighborhood" potentially dangerous point buffer overflow computer storage devices;
field indicate the reasons for buffer overflow computer storage devices - values of the original variables, leading to vosn is knowing vulnerability source code of the software;
the indicator of the criticality of the vulnerability of the source code of the software;
field specify the list of rules or algorithms to mitigate the source code of the software.

7. The method according to any one of claims 1 to 5, characterized in that at each i-th level of verification BY RVC diagnostics verification process IR ON on the basis of measuring the duration of the basic steps of finding vulnerabilities and comparing the obtained values with the previously prescribed or predicted estimates of measure (degrees, entropy, etc.) the criticality of the vulnerability of the PC.

8. The interactive control system (ISS) contains at each level of verification BY RVC Sijinteractive programmable devices (ICS) verification, where Sij, i=0, 1,..., I, j=1, 2,..., QjI - the number of levels of verification, Qj- the number of imps verification FOR the i-th level of verification FOR each SijICS i-th level are connected by at least one ICS (i-1)-th level or imps (i+1)-th level, each SijICS i-level verification includes: hardware and software block (APB) lexical and semantic analysis/parsing, AAC conversion code, APB code analysis, APB CPU control, video, interfaces, hard, floppy and optical disks, serial ports, network the interfaces and system memory, combined system bus, the system memory contains a permanent memory (ROM) and random access memory (RAM/RAM), in cells of RAM and hard drive place/write operating systems, application programs, databases, and knowledge bases that contain listings of the source programs, the grammar of the programming language (e.g. grammar of the programming language C), rules of transformation of the parse tree of the program listing, the parse tree of the program listing, table, types of programming language, annotations, external functions, including grammar and semantics, program code in a language internal representation, conditions of correctness of language internal representation of the program source code, terms of validation of suspicious points in the program source code, information base, containing a system of constraints in the form of algebraic equations and inequalities, reports about discovered vulnerabilities in software code, including:
an indication of the location of potential vulnerabilities in the source code of the program that contains the file name of the program listing, the line number and the position number in the string program, which may result in an overflow of the memory buffer, the context of the source program containing a possible full the e or some "neighborhood" potentially dangerous point of overflow of the buffer storage device;
an indication of why the overflow of the memory buffer - the values of the original variables, leading to the emergence of vulnerabilities in source code of the software;
the rate or degree of criticality of vulnerabilities source code of the software;
the indication of the list of rules or algorithms to mitigate the source code of the software;
while the process of verification of the IR software for distributed computing systems is a dynamic procedure for receiving and processing PC software dependent and independent front-end channels, respectively, the first group of signals characterized by independent time interactive processes of verification of IR ON, for example, the first group of signals represents the set of observed interactive processing IR ON coming independent interface channels,
and the second group of signals supplied by dependent interface channels.

9. The system of claim 8, wherein the hardware-software unit CPU control, ensuring synchronization of the main modes of interactive software verification of distributed computing systems, contains serially connected unit normalizing converters (BNP), a module of commutat the RA, module analog-to-digital Converter (ADC)module the formation of a static coordinate raster graphic (MPSGE), the video control unit (BV), a switching regulator (VR) and the module forming dynamic scan raster graphic (MIDGAR), the first and second information inputs/outputs of which are connected respectively to the control inputs of the switching module and an analog-to-digital Converter, and the third, fourth, fifth, sixth, seventh and eighth with the second, third, fourth, fifth, sixth and seventh information inputs/outputs MISCHER, the second input unit of United video with the seventh information input/output MTSHAR information and the eighth input/output MIDGAR.



 

Same patents:

FIELD: information technologies.

SUBSTANCE: invention is related to facilities of training and research automation and may be used in interactive systems of research and development works automation in process of software (SW) verification in distributed computer complexes (DCC). Suggested method and device for its realisation provide complete manageability and observability of the main processes of SW initial code verification. At the same time processes of SW initial code input and processing are combined along dependent or independent interface channels, on the basis of application of sensor or mechanical manipulators of computer operator workplace, user interfaces of local or global network. Sections or points of SW initial code vulnerability are defined on the basis of SW initial code transformation into internal representation, which is stored in the form of databases and knowledge bases, and sections or points of SW initial code vulnerability are defined on the basis of automatic making and solving of according equation systems.

EFFECT: expansion of functional resources of DCC SW verification processes.

9 cl, 39 dwg, 26 tbl

FIELD: physics; computer facilities.

SUBSTANCE: offered invention concerns ways and systems for transformation of object of one type in object of other type. Transformation can be carried out in an augmented agent of serialisation which carries out serialisation, deserialisation and transformation of objects of various types. Changes during performance are imported to operation of an agent of serialisation by means of one or more procedures of expansion which realise required configuring for specific needs or expansion, thus not demanding replacements of other available procedures. On the basis of the information on the type, identified for initial object, object will converse to the intermediate representation which supposes change during performance, including change of names of object, types of object and object data. The intermediate representation of initial object change according to procedures of expansion which make changes to operation of a resort of serialisation during performance, and the intermediate representation will converse to target object or type.

EFFECT: possibility of change or configuring for specific needs of operation of transformation process to performance time.

35 cl, 7 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention is related to processing of electronic ink. Method of the first data structure matching with the second data structure consists in the following: for every unit of the second data structure it is defined whether this unit received change from appropriate unit in the first data structure; for every unit in the second data structure, for which it has been defined that it received change from appropriate unit in the first data structure, attempt of access is realised to this unit in the first data structure; if mentioned unit in the first data structure is unachievable, realisation of mentioned change is prevented in the second data structure; if it is achievable - it is defined, when mentioned change in relation to the second data structure creates optional collision, and sometimes obligatory collision; if change creates optional collision, it is defined whether it is prohibited by collision criteria; if optional collision is not prohibited, mentioned change is performed; if it is prohibited - realisation of mentioned change is prevented, at that mentioned collision criteria prohibit removal of ink strokes from end unit under fixed unit.

EFFECT: expansion of method functional resources.

12 cl, 49 dwg

FIELD: physics, computer facilities.

SUBSTANCE: invention concerns computer facilities. The system of transformation of the files, having at least one file, associated with one or more non-structured properties is given. The output agent of properties of a file manipulates with non-structured properties according to one or several structured properties, associated with medium of storehouse of the structured objects. If not structured file be used in a context of medium of storehouse of the structured objects, unfolding operation is carried out for updating of not structured properties in a file in the structured properties approaching for operation in the environment of storehouse of structured objects. If concerning the developed device the manipulation in the environment of storehouse of the structured objects be executed, operation of compression or an inverse transformation is carried out for updating of properties in the file.

EFFECT: interaction and compatibility possibility between non-compatible data systems.

26 cl, 9 dwg

FIELD: computer science, in particular, engineering of automated system for distributed processing of text documents.

SUBSTANCE: system contains block for receiving text documents, blocks for identification of base address of text documents, block for selection of structure of text document, block for modifying record address for text document, block for selecting sections of text documents, block for addressing sections of text documents, block for modifying record address of text document, block for selecting sections of text documents, block fro addressing sections of text documents, block for modifying reading address of text document section, block for receiving text documents of executives, block for identification of base address of documenting of sections of text documents, block for recording number of completed tasks, block for modification of address of record of completed tasks, block for commutation of channels for dispensing text documents and block for dispensing data and control signals.

EFFECT: increased speed of operation of system by means of localization of addresses of text documents in system database by identifiers of the very text documents.

13 dwg

FIELD: the invention refers to the system of remote training.

SUBSTANCE: the system has an arrangement for providing training in rendering training services through a net; an arrangement for transmitting texts connected with training aids, an arrangement for evaluation of reception of the answer through a net; an arrangement for transmitting of evaluation of transmitting the result of evaluation to a user; a database about members supporting training; an arrangement for selection of supporting members for reception of inquiry about support from the user through a net and for selection of a member for training in required field of specialization; an intermediary arrangement for connection for fulfillment of the role of the mediator at connecting the contact address of the selected member supporting training and the user through a net.

EFFECT: allows to provide services in training with dynamically changing training changes depending from the evaluation of the degree of perception in remote system with corresponding support.

6 cl, 9 dwg

The invention relates to the publishing industry and can be used for the preparation and issue of reference books
The invention relates to the field of electronics and is designed, for example, to use auxiliary data arrays in the conversion process and/or verification of computer codes in the form of symbols, and the corresponding portions of the image
The invention relates to the field of electronics and can be used, for example, in the way of interrelated activation computer code in the form of symbols and corresponding portions of the image

The invention relates to the field of computer engineering and can be used to control the addressing e-mail messages when a subscriber in an open computer network with the ability to control on a formal or natural language

FIELD: the invention refers to the system of remote training.

SUBSTANCE: the system has an arrangement for providing training in rendering training services through a net; an arrangement for transmitting texts connected with training aids, an arrangement for evaluation of reception of the answer through a net; an arrangement for transmitting of evaluation of transmitting the result of evaluation to a user; a database about members supporting training; an arrangement for selection of supporting members for reception of inquiry about support from the user through a net and for selection of a member for training in required field of specialization; an intermediary arrangement for connection for fulfillment of the role of the mediator at connecting the contact address of the selected member supporting training and the user through a net.

EFFECT: allows to provide services in training with dynamically changing training changes depending from the evaluation of the degree of perception in remote system with corresponding support.

6 cl, 9 dwg

FIELD: computer science, in particular, engineering of automated system for distributed processing of text documents.

SUBSTANCE: system contains block for receiving text documents, blocks for identification of base address of text documents, block for selection of structure of text document, block for modifying record address for text document, block for selecting sections of text documents, block for addressing sections of text documents, block for modifying record address of text document, block for selecting sections of text documents, block fro addressing sections of text documents, block for modifying reading address of text document section, block for receiving text documents of executives, block for identification of base address of documenting of sections of text documents, block for recording number of completed tasks, block for modification of address of record of completed tasks, block for commutation of channels for dispensing text documents and block for dispensing data and control signals.

EFFECT: increased speed of operation of system by means of localization of addresses of text documents in system database by identifiers of the very text documents.

13 dwg

FIELD: physics, computer facilities.

SUBSTANCE: invention concerns computer facilities. The system of transformation of the files, having at least one file, associated with one or more non-structured properties is given. The output agent of properties of a file manipulates with non-structured properties according to one or several structured properties, associated with medium of storehouse of the structured objects. If not structured file be used in a context of medium of storehouse of the structured objects, unfolding operation is carried out for updating of not structured properties in a file in the structured properties approaching for operation in the environment of storehouse of structured objects. If concerning the developed device the manipulation in the environment of storehouse of the structured objects be executed, operation of compression or an inverse transformation is carried out for updating of properties in the file.

EFFECT: interaction and compatibility possibility between non-compatible data systems.

26 cl, 9 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention is related to processing of electronic ink. Method of the first data structure matching with the second data structure consists in the following: for every unit of the second data structure it is defined whether this unit received change from appropriate unit in the first data structure; for every unit in the second data structure, for which it has been defined that it received change from appropriate unit in the first data structure, attempt of access is realised to this unit in the first data structure; if mentioned unit in the first data structure is unachievable, realisation of mentioned change is prevented in the second data structure; if it is achievable - it is defined, when mentioned change in relation to the second data structure creates optional collision, and sometimes obligatory collision; if change creates optional collision, it is defined whether it is prohibited by collision criteria; if optional collision is not prohibited, mentioned change is performed; if it is prohibited - realisation of mentioned change is prevented, at that mentioned collision criteria prohibit removal of ink strokes from end unit under fixed unit.

EFFECT: expansion of method functional resources.

12 cl, 49 dwg

FIELD: physics; computer facilities.

SUBSTANCE: offered invention concerns ways and systems for transformation of object of one type in object of other type. Transformation can be carried out in an augmented agent of serialisation which carries out serialisation, deserialisation and transformation of objects of various types. Changes during performance are imported to operation of an agent of serialisation by means of one or more procedures of expansion which realise required configuring for specific needs or expansion, thus not demanding replacements of other available procedures. On the basis of the information on the type, identified for initial object, object will converse to the intermediate representation which supposes change during performance, including change of names of object, types of object and object data. The intermediate representation of initial object change according to procedures of expansion which make changes to operation of a resort of serialisation during performance, and the intermediate representation will converse to target object or type.

EFFECT: possibility of change or configuring for specific needs of operation of transformation process to performance time.

35 cl, 7 dwg

FIELD: information technologies.

SUBSTANCE: invention is related to facilities of training and research automation and may be used in interactive systems of research and development works automation in process of software (SW) verification in distributed computer complexes (DCC). Suggested method and device for its realisation provide complete manageability and observability of the main processes of SW initial code verification. At the same time processes of SW initial code input and processing are combined along dependent or independent interface channels, on the basis of application of sensor or mechanical manipulators of computer operator workplace, user interfaces of local or global network. Sections or points of SW initial code vulnerability are defined on the basis of SW initial code transformation into internal representation, which is stored in the form of databases and knowledge bases, and sections or points of SW initial code vulnerability are defined on the basis of automatic making and solving of according equation systems.

EFFECT: expansion of functional resources of DCC SW verification processes.

9 cl, 39 dwg, 26 tbl

FIELD: information technologies.

SUBSTANCE: invention is related to facilities of training and science research automation and may be used in interactive systems of research and development works automation in process of software (SW) verification in distributed computer complexes (DCC). Suggested method and system for its realisation provide complete manageability and observability of the main processes of SW initial code verification. At the same time at each level of DCC processes of SW initial code input and processing are combined along dependent or independent interface channels, on the basis of application of sensor or mechanical manipulators of computer operator workplace, network interfaces of local or global network Sections or points of SW initial code vulnerability are defined on the basis of SW initial code transformation into internal representation, which is stored in the form of databases and knowledge bases, and sections or points of SW initial code vulnerability are defined on the basis of automatic making and solving of according equation systems.

EFFECT: expansion of functional resources of DCC SW verification processes

9 cl, 40 dwg, 26 tbl

FIELD: information technologies.

SUBSTANCE: method includes receiving information entered in natural language and analysis of information entered in natural language to identify contained in it semantic information. For part of information entered in natural language, correspondence with "command" objects and "object" objects of scheme based on semantic information and entered in natural language information. The method also contains representation of data from data source in a table of columns and rows on the basis of scheme and corresponding parts of information which has been entered in natural language.

EFFECT: providing more effective interface for creation and representation of table with information from data source.

35 cl, 5 dwg

FIELD: information technologies.

SUBSTANCE: in invention it is automatically detected, which is the category of printed document, and unauthorised printing is prevented. In method printed document is analysed for availability of confidential information, system comprises user device, printing device, server of printing control service, converter unit, server of databases, file storage, unit of recognition, server of context analysis and alarm service.

EFFECT: provision of information safety, detection of document flows containing confidential information and requiring high extent of control.

2 cl

FIELD: information technology.

SUBSTANCE: method provides a preliminary presentation which automatically shows the intended outcome of applying one or another control to data. This is preferred when analysing electronic worksheet data by formatting certain data based on the control condition. The method involves identification of one or more data parametres subject to formatting based on the condition on display, selection of a predefined condition and automatic temporary application of that predefined condition to parametre(s), display of the temporary preliminary presentation on the display of the said predefined condition applied to data which correspond to the said predefined condition. The method also enables preliminary change of conditions and parametres applied to data, and automatically provide corresponding preliminary presentation of the effect of such application of the altered conditions with respect to displayed data.

EFFECT: faster formatting of displayed data.

27 cl, 28 dwg

Up!