Loophole scanning method, device and system
A vulnerability scanning and vulnerability technology, which is applied in the field of system security, can solve problems such as long scanning time, unrecognizable verification codes, and insufficient transparency of mining, so as to improve the efficiency of vulnerability scanning, shorten the time of vulnerability scanning, and shorten the time of vulnerability scanning.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] According to an embodiment of the present invention, an embodiment of a vulnerability scanning method is provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, although A logical order is shown in the flowcharts, but in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0033] figure 1 is a flow chart of a vulnerability scanning method according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:
[0034] Step S102, multiple vulnerability scanning nodes acquire multiple user requests, wherein each vulnerability scanning node acquires at least one user request, and the multiple user requests are requests generated by users accessing webpages.
[0035] Specifically, multiple vulnerability scanning nodes can be dep...
Embodiment 2
[0083] According to an embodiment of the present invention, an embodiment of a vulnerability scanning device is provided.
[0084] image 3 is a schematic diagram of a vulnerability scanning device according to an embodiment of the present invention, such as image 3 As shown, the device includes:
[0085] The acquiring module 31 is used for multiple vulnerability scanning nodes to acquire multiple user requests, wherein each vulnerability scanning node acquires at least one user request, and the multiple user requests are requests generated by users accessing webpages.
[0086] Specifically, multiple vulnerability scanning nodes can be deployed in a distributed manner, and the number of vulnerability scanning nodes can be set according to needs. For example, five vulnerability scanning nodes can be deployed, and each vulnerability scanning node has the ability to scan vulnerabilities. Vulnerability scanning can be performed automatically; the above-mentioned user request ca...
Embodiment 3
[0095] According to an embodiment of the present invention, an embodiment of a vulnerability scanning system is provided.
[0096] Figure 4 is a schematic diagram of a vulnerability scanning system according to an embodiment of the present invention, such as Figure 4 As shown, the system includes:
[0097] A plurality of vulnerability scanning nodes 41 are used to obtain multiple user requests, and perform vulnerability scanning on multiple user requests at the same time to obtain the scanning results of each user request, wherein each vulnerability scanning node obtains at least one user request, and multiple A user request is a request generated by a user accessing a webpage, and the scanning result includes: whether there is a vulnerability in the system corresponding to each user request and the type of the vulnerability.
[0098] Specifically, multiple vulnerability scanning nodes can be deployed in a distributed manner, and the number of vulnerability scanning nodes ...
PUM

Abstract
Description
Claims
Application Information

- Generate Ideas
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com