Supercharge Your Innovation With Domain-Expert AI Agents!

A method and device for processing terminal vulnerabilities

A terminal and vulnerability technology, applied in the computer field, can solve problems such as reducing terminal performance and affecting the fluency of using the terminal, and achieve the effect of ensuring fluency

Active Publication Date: 2016-02-24
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Among them, security protection software needs to occupy a large amount of resources such as the terminal CPU (Central Processing Unit, central processing unit) and memory when repairing vulnerabilities, which will reduce the performance of the terminal. , which will affect the smoothness of the user's use of the terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for processing terminal vulnerabilities
  • A method and device for processing terminal vulnerabilities
  • A method and device for processing terminal vulnerabilities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0073] Such as figure 1 As shown, the embodiment of the present invention provides a method for processing terminal vulnerabilities, including:

[0074] Step 101: Periodically collect current operating status information of the terminal;

[0075] Step 102: When there is a loophole in the terminal, determine whether to repair the loophole existing in the terminal according to the current running state information of the terminal.

[0076] In the embodiment of the present invention, the current running state information of the terminal is periodically collected; when there is a loophole in the terminal, it is determined whether to repair the loophole existing in the terminal according to the current running state information of the terminal. In this way, when the user is using the terminal and occupies more resources of the terminal, the operation status of the terminal can be determined according to the current operation status information of the terminal, and it can be determ...

Embodiment 2

[0078] Such as figure 2 As shown, the embodiment of the present invention provides a method for processing terminal vulnerabilities, including:

[0079] Step 201: Periodically collect current operating state information of the terminal, the operating state information at least including CPU usage, proportion of available memory space, and network connectivity;

[0080] Specifically, a preset timer is started, and the timer is counted. When the timer overflows, the timer is set to count again, and the current operating state information of the terminal is collected.

[0081] Wherein, the current running state information of the terminal may be collected periodically when the terminal is started. When the timer overflows each time, an API (Application Programming Interface, application programming interface) function for collecting running state information can be called from the operating system of the terminal, and the running state information of the terminal can be collect...

Embodiment 3

[0132] Such as image 3 As shown, the embodiment of the present invention provides a device for processing terminal vulnerabilities, including:

[0133] A collection module 301, configured to periodically collect current operating status information of the terminal;

[0134] The first determination module 302 is configured to determine whether to repair the existing vulnerabilities of the terminal according to the current running state information of the terminal when there are vulnerabilities in the terminal.

[0135] Among them, see Figure 4 , the collection module 301 includes:

[0136] The starting unit 3011 is used to start a preset timer and make the timer count;

[0137] The collection unit 3012 is configured to set the timer to count again when the timer overflows, and to collect current operating status information of the terminal.

[0138] Wherein, the operating status information of the terminal includes at least the CPU usage rate, the proportion of available ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for processing terminal bugs, belonging to the field of computers. The method comprises the following steps of: periodically collecting the current running status information of a terminal; and when the terminal has bugs, determining whether the bugs existing in the terminal are fixed according to the current running status information of the terminal. The device comprises a collecting module and a first determining module. The fluency of a user using the terminal cannot be influenced when the bugs in the terminal are fixed.

Description

technical field [0001] The invention relates to the field of computers, in particular to a method and device for processing terminal vulnerabilities. Background technique [0002] Vulnerabilities often exist in terminals, which are defects in the specific implementation of terminal hardware, software, protocols, or system security policies. Attackers can use this vulnerability to access or destroy the terminal system without authorization, which affects the security of the terminal. pose a threat. [0003] At present, security protection software can be installed on the terminal. The security protection software can detect the vulnerability of the terminal, download the patch corresponding to the vulnerability from the network, and install the downloaded patch to repair the vulnerability, thus providing a guarantee for the security of the terminal. . [0004] Among them, security protection software needs to occupy a large amount of resources such as the terminal CPU (Cent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/00
Inventor 欧贫扶邓欣
Owner TENCENT TECH (SHENZHEN) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More