US 12,327,112 B2
Compliance adaption plans and software component matchmaking
Juliana Medeiros Destro, Indaiatuba (BR); Flavio Gilberto De Souza, Estiva Gerbi (BR); Diego Aparecido Wolfshorndl, Piracicaba (BR); and Marco Aurelio Stelmar Netto, Sao Paulo (BR)
Assigned to International Business Machines Corporation, Armonk, NY (US)
Filed by International Business Machines Corporation, Armonk, NY (US)
Filed on Nov. 23, 2021, as Appl. No. 17/533,188.
Prior Publication US 2023/0161585 A1, May 25, 2023
Int. Cl. G06F 8/73 (2018.01); G06F 21/60 (2013.01); G06F 40/242 (2020.01)
CPC G06F 8/73 (2013.01) [G06F 21/60 (2013.01); G06F 40/242 (2020.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
correlating, by a processor, a context of a written data privacy requirement with a first code segment of a source code of a target computer system;
receiving, by the processor, a selection of a first candidate code segment to replace the first code segment;
determining, by the processor, that the selected first candidate code segment has replaced the first code segment and is integrated into the source code;
transmitting, by the processor, a stimulation signal to the target computer system, wherein the stimulation signal is directed toward the first candidate code segment integrated into the source code; and
determining, by the processor, whether the source code with the first candidate code segment replacing the first code segment is in compliance with the written data privacy requirement based on an output to the stimulation signal.