Scanning prompt method and device for software vulnerabilities

A software vulnerability and software installation technology, applied in the direction of platform integrity maintenance, etc., can solve problems such as multiple security, hidden dangers, and consumption of computing resources, and achieve the effects of ensuring security, improving security, and reducing the amount of calculation

Active Publication Date: 2013-12-25
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] But, utilize the security assistant software of prior art, after software is installed on client computer, user can't be informed in time whether this third-party software has loophole
The user can only trigger the scanning and prompting of the software vulnerabilities of the client computer after manually opening the security assistance software and clicking buttons such as vulnerability scanning, or the software vulnerabilities of the client computer are scanned and prompted after the operating system is restarted. Vulnerability scanning prompts for newly installed software have a certain delay, and it is often discovered that the software has vulnerabilities after a long period of time after the newly installed software has been used, and there are many security risks
[0007] In addition, because the timing of the existing security auxiliary software scanning prompts for software vulnerabilities is not timely and accurate, it has no specificity for the scanned objects. Once the scanning prompt function for vulnerabilities is triggered, for the sake of security, it is necessary to All software vulnerabilities on the client are scanned, which consumes a lot of computing resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Scanning prompt method and device for software vulnerabilities
  • Scanning prompt method and device for software vulnerabilities
  • Scanning prompt method and device for software vulnerabilities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0027] figure 1 It is a schematic diagram of the main flow of the scanning prompt method for software loopholes in the present invention, see figure 1 , the method includes:

[0028] 101. Set up a software vulnerability database, which includes vulnerability information and its corresponding software name and version number;

[0029] 102. Monitor the software installation event in the registry of the client operating system, and read the name and version number of the software when software installation is detected;

[0030] 103. Scan for vulnerabilities, that is: compare the read software name of the installed software with the software name in the software vulnerability library, if the software name of the installed software is in the software vulnerability library, then read The version number of the installed software obtained ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a scanning prompt method and device for software vulnerabilities. The method comprises the steps of setting vulnerability information and a software name and a version number corresponding to the vulnerability information in a software vulnerability database; monitoring a software installing event of a client operation system registry by a monitoring module, and reading the software name and version number when the monitoring module monitors the installation of the software; comparing the software name of the installed software obtained by read with the software name in the software vulnerability database by a vulnerability scanning module; if the software name of the installed software is in the software vulnerability database, comparing the version number of the installed software obtained by read with the version number corresponding to the software in the software vulnerability database; if the version number of the installed software is in the software vulnerability database, determining the corresponding vulnerability information of the version number; and prompting the vulnerability information determined by the vulnerability scanning module on the client by a prompt module. By using the method and device disclosed by the invention, the security of the newly installed software can be improved, and the calculated amount of vulnerability scanning is reduced.

Description

technical field [0001] The invention relates to the technical field of computer data processing, in particular to a scanning prompt method and device for software loopholes. Background technique [0002] Nowadays, in the computer network environment where viruses are rampant and hackers are everywhere, software security has become a technical issue that has attracted much attention. One of the important problems is the vulnerability in the software system. Often in a seemingly unbreakable software system, just because of a small loophole, the entire security system is easily broken by hackers, and the control of the entire system is completely lost. [0003] The so-called loopholes usually refer to some errors (bugs), defects, etc. in the software, but such bugs and defects are different from bugs in ordinary software testing. Bugs in general software testing refer to functional or logical errors, such as dialog box pop-up errors, system failure to execute certain function...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
Inventor 杜晨亮
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products