Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for obtaining software security defects based on vertical search and semantic annotation

A vertical search and semantic annotation technology, applied in special data processing applications, instruments, electrical and digital data processing, etc., can solve the problems of expensive software maintenance and fault recovery, computer loss, heavy and other problems

Active Publication Date: 2012-05-02
江苏永达电力电信安装工程有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Computer systems are destroyed and paralyzed, key information leaks lead to huge economic losses and other intangible losses, and software maintenance and fault recovery costs become more and more expensive. It can be seen that the losses caused by computer attacks are very heavy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for obtaining software security defects based on vertical search and semantic annotation
  • Method for obtaining software security defects based on vertical search and semantic annotation
  • Method for obtaining software security defects based on vertical search and semantic annotation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Such as figure 1 As shown, the overall technical solution process of the present invention is as follows: firstly, the domain search crawler is used to crawl the published security defect information web pages on the World Wide Web, and the security defect domain filter trainer provides powerful filtering support for the search crawler to complete the task; These downloaded webpages are semantically annotated to make the webpages carry semantic information and make the machine understandable; then an annotation analysis tool is designed to extract further information from the annotated information; finally the information is provided for the software security defect knowledge base and software security vulnerability analysis Interface to provide data support for them. The present invention will be described in detail below.

[0027] 1. Vertical search

[0028] Such as figure 2 The vertical search crawler download schematic diagram shown. Vertical search is a professional...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of dependable computing, in particular to a method for obtaining software security defects based on vertical search and semantic annotation, which comprises the steps of: firstly, creeping a security defect information webpage published on a World-Wide-Web by using a field search creeper, providing a forceful filter support for the search creeper completing the task by a security defect filed filter trainer; secondly, carrying out semantic annotation on downloaded webpages to enable the webpages to be carried out with semantic information and allow a machineto be understood; thirdly, designing an annotation analysis tool for further carrying out information extraction on the annotated information; and fourthly, providing an interface for carrying out a software security knowledge base and a software security hole analysis by using the information. The invention can provide a large quantity of data and the forceful support for the software security knowledge base and the software security hole analysis.

Description

Technical field [0001] The invention belongs to the field of trusted computing and relates to a method for obtaining software security defects. Background technique [0002] With the rapid development of computers today, the security features of computer software are not only additional attributes of software, but also essential features. And with the rapid development of today’s network, the requirements for software reliability and security are getting higher and higher. This is because the network makes computer applications and computer systems present a highly interconnected development trend. This trend is bringing the IT industry At the same time as the amazing opportunity comes, it also means that these highly interconnected computers are more likely to be attacked. The computer system is damaged and paralyzed. The leakage of key information leads to huge economic losses and other intangible losses. Software maintenance and failure recovery costs have become more and mor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/30
Inventor 李晓红刘丰煦杜洪伟许光全徐超
Owner 江苏永达电力电信安装工程有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products