Security vulnerability management method and system and device

A vulnerability management and security technology, applied in the computer field, can solve problems such as low efficiency and cumbersome work, and achieve the effect of improving work efficiency and unified management

Active Publication Date: 2015-02-11
SHENZHEN TENCENT COMP SYST CO LTD
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem of cumbersome work and low efficiency when the interface personnel manually send multiple information containing security vulnerabilities to the corresponding developers in the prior art, the embodiment of the present invention provides a security vulnerability management method and system and equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security vulnerability management method and system and device
  • Security vulnerability management method and system and device
  • Security vulnerability management method and system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0036] See figure 1 As shown in , it shows a schematic diagram of the implementation environment involved in the security vulnerability management method provided by some embodiments of the present invention. The implementation environment may include: Internet company products 102 , security researchers 104 , Internet company open platforms 106 , Internet company management platforms 108 and Internet company repair personnel 110 .

[0037] Products 102 of an Internet company are usually all or part of the products released by the Internet company, such as forums, chat applications, antivirus programs, browsers, and input methods.

[0038] The security researchers 104 can usually be outsiders of the Internet company, and these securit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security vulnerability management method and system and a device, and belongs to the technical field of computers. The method includes the steps of receiving security vulnerability information uploaded by a user, sending the security vulnerability information to a management platform so that the management platform can find a repairer corresponding to the security vulnerability information according to the security vulnerability information, and sending prompting information to the repairer, wherein the prompting information is used for prompting the repairer to repair the security vulnerability information. By sending the safety vulnerability information uploaded by the user to the management platform so as to find the repairer corresponding to the security vulnerability information through the management platform and prompting the repairer to repair the security vulnerability information, the problems that work is complex and efficiency is low when multiple pieces of information containing security vulnerability are manually sent to corresponding developers respectively by interface personnel in the prior art are solved, and the effects that the reported security vulnerability information can be managed in a unified mode and the work efficiency can be improved are achieved.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a security loophole management method, system and equipment. Background technique [0002] Security loopholes refer to defects in the specific implementation of software, hardware, and protocols, or in system security policies. When a system has a security hole, an attacker can access or destroy the system without authorization. In order to reduce the damage to the system by attackers, these security holes need to be collected and patched. [0003] Currently, there is a security vulnerability collection method, which may include: security workers outside the Internet company collect the security vulnerabilities of the application programs released by the Internet company, and use the public contact information of the Internet company (for example, phone calls, chat applications or mail and other communication methods) to inform the interface personnel of the Internet ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/12G06F21/577
Inventor 胡珀马松松李冬阳徐波林桠泉胡享梅何林如宗泽杨勇
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products