Check patentability & draft patents in minutes with Patsnap Eureka AI!

Vulnerability repair method and device

A vulnerability repairing technology to be repaired, applied in information security and computer fields, can solve problems such as large kernel differences, limited application scenarios and compatibility, lack of code versatility, etc., and achieve the effect of overcoming the impact of fragmentation

Active Publication Date: 2017-12-15
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Taking the Linux kernel as an example, the kernel versions used in various Android devices are characterized by fragmentation, and the differences between different kernels are large, so there is a lack of good code versatility. limit
[0003] Due to the above reasons, the repair methods in the prior art depend on the source code of the running system or require the original kernel to provide corresponding functions to cooperate, and the generated patch can only be used to repair a specific compiled version of the kernel, which is extremely limited. Its application scenarios and compatibility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability repair method and device
  • Vulnerability repair method and device
  • Vulnerability repair method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0031] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0032] figure 1 An exemplary system architecture 100 to which embodiments of the vulnerability repairing method or the vulnerability repairing apparatus of the present application can be applied is shown.

[0033] like figure 1 As shown, the system architecture 100 may inc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed are a vulnerability-fixing method and device. The method comprises: collecting attribute information about a kernel to be fixed (201), the attribute information comprising feature information used for characterizing a code-loading method supported by the kernel to be fixed; acquiring a vulnerability-fixing code matching the feature information (202); based on the attribute information, configuring the vulnerability-fixing code so that the vulnerability-fixing code is adapted to the kernel to be fixed (203); and using the configured vulnerability-fixing code to perform vulnerability fixing on the kernel to be fixed (204). This method is compatible with a plurality of methods for loading a kernel fixing code.

Description

technical field [0001] The present application relates to the field of computer technology, specifically to the field of information security technology, and in particular to a vulnerability repair method and device. Background technique [0002] Various security vulnerabilities are often found in the operating system kernel. Due to the complexity of the principle of the security vulnerability itself, it will consume a lot of human resources to deal with it. Some manufacturers will delay the update or even give up the maintenance of the old version, which brings great security risks to users. Taking the Linux kernel as an example, the kernel versions used in various Android devices are characterized by fragmentation, and the differences between different kernels are large, so there is a lack of good code versatility. limit. [0003] Due to the above reasons, the repair methods in the prior art depend on the source code of the running system or require the original kernel t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/57
Inventor 夏良钊郑龙日卢永强包沉浮张煜龙韦韬
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More