Vulnerability identification technology-based plugin safety scanning device and scanning method
A technology of security scanning and identification technology, applied in the field of plug-in security scanning devices based on vulnerability identification technology, to achieve the effects of enriching vulnerability types and plug-in information, improving experience, and quickly updating the plug-in security vulnerability library
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0023] The following describes the implementation of the present invention through specific specific examples. Those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific embodiments, and various details in this specification can also be modified or changed based on different viewpoints and applications without departing from the spirit of the present invention. It should be noted that the following embodiments and the features in the embodiments can be combined with each other if there is no conflict.
[0024] Refer to figure 1 , Is a schematic diagram of the structure of a plug-in security scanning device according to an embodiment of the present invention. As shown in the figure, the plug-in security scanning device of the present invention includes: a vulnerability analysis module, a vulnerability s...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap