Loophole detection method, device and system
A vulnerability detection and vulnerability technology, applied in the field of information processing, can solve problems such as information leakage, achieve the effect of solving information leakage and improving information security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0024] According to the embodiment of the present application, a method embodiment of a vulnerability detection method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0025] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a block diagram of the hardware structure of a computer terminal of a vulnerability detection method in the embodiment of the present application. Such as figure 1 As shown, the computer terminal 10 may include one or more (only one is shown in the figure) pro...
Embodiment 2
[0077] According to the embodiment of the present application, an embodiment of a device for implementing the above method embodiment is also provided, and the device provided in the above embodiment of the present application can run on a computer terminal.
[0078] Figure 4 is a schematic structural diagram of a vulnerability detection device according to an embodiment of the present application.
[0079] Such as Figure 4 As shown, the vulnerability detection device may include a first acquisition unit 402 and a detection unit 404 .
[0080] Wherein, the first acquiring unit 402 is configured to acquire the print log information outputted by the browser component after executing the running file, wherein, the browser component executes the running file that has a hyperlink with the running file to be executed. Detecting files, wherein the hyperlink between the file to be detected and the running file is pre-established, and the running file is the file pointed to by the ...
Embodiment 3
[0098] According to an embodiment of the present application, a vulnerability detection system is also provided, Figure 9 is a schematic structural diagram of a vulnerability detection system according to an embodiment of the present application.
[0099] Such as Figure 10 As shown, the system includes: a vulnerability detection device 1002 and a browser component 1004 .
[0100] Wherein, the vulnerability detection device 1002 is used to acquire the print log information output by the browser component after executing the running file; the browser component 1004 is used to execute the The file to be detected, wherein, the hyperlink between the file to be detected and the running file is pre-established, and the running file is the file pointed to by the pre-acquired file domain link; the vulnerability detection device 1002 is further configured to determine whether there is a loophole in the file to be detected according to the print log information.
[0101] Optionally,...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com