Vulnerability identification technology-based plugin safety scanning device and scanning method

A technology of security scanning and identification technology, applied in the field of plug-in security scanning devices based on vulnerability identification technology, to achieve the effects of enriching vulnerability types and plug-in information, improving experience, and quickly updating the plug-in security vulnerability library

Active Publication Date: 2016-04-06
北京凌云信安科技有限公司
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the shortcomings of the prior art described above, the purpose of the present invention is to provide a plug-in security scanning device and scannin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability identification technology-based plugin safety scanning device and scanning method
  • Vulnerability identification technology-based plugin safety scanning device and scanning method
  • Vulnerability identification technology-based plugin safety scanning device and scanning method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0023] The following describes the implementation of the present invention through specific specific examples. Those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific embodiments, and various details in this specification can also be modified or changed based on different viewpoints and applications without departing from the spirit of the present invention. It should be noted that the following embodiments and the features in the embodiments can be combined with each other if there is no conflict.

[0024] Refer to figure 1 , Is a schematic diagram of the structure of a plug-in security scanning device according to an embodiment of the present invention. As shown in the figure, the plug-in security scanning device of the present invention includes: a vulnerability analysis module, a vulnerability s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a vulnerability identification technology-based plugin safety scanning device. The device comprises a vulnerability analysis module, wherein the vulnerability analysis module is connected with a vulnerability storage module; a contrastive analysis module is connected with the vulnerability analysis module, the vulnerability storage module, a plugin reading module and a prompt module; and the vulnerability analysis module is used for carrying out search and analysis through stored plugin vulnerability information after obtaining plugin information, and carrying out safety vulnerability analysis through the vulnerability analysis module and prompting the user when a corresponding plugin and plugin vulnerability information are not stored. The invention furthermore provides a scanning method. Through using the technical scheme, the occupied hardware resources are less and the use is convenient; and meanwhile, along with the continuous increase of the quantity of scanning URLs, more diversified data can be acquired, and the vulnerability type and plugin information of a safety vulnerability library can be enriched to form more comprehensive plugin vulnerability information, so that the plugin vulnerability scanning in the using process of the vulnerability identification technology-based plugin safety scanning device and the scanning method is more and more accurate, and the user experience is improved at the same time.

Description

technical field [0001] The invention relates to Internet security technology, in particular to a plug-in security scanning device and scanning method based on vulnerability identification technology. Background technique [0002] With the popularity of the Internet in work and life, the speed of information dissemination has greatly increased, and the value of information is particularly important. As a new social and media platform, Weibo will have a lasting and profound impact on everyone's life, and the application of Weibo will continue the Facebook application model and become more and more standardized. At present, the use of blogs and microblogs on the Internet is increasing. With the increasing demand, more functions can be provided through plug-ins. For example, the use of microblogs and blogs is more frequent. At the same time, its security must also be controlled. [0003] On the one hand, the existing technology performs security scanning and monitoring through...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/033
Inventor 郑星星
Owner 北京凌云信安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products