Security vulnerability detection method and device
A vulnerability detection and vulnerability technology, applied in the field of security vulnerability detection, can solve the problems of undetectable data file security, insecure data files, user information security threats, etc., to achieve the effect of improving security and practicability and reducing threats
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] Embodiments of the present invention provide a method and device for detecting security vulnerabilities, which are used to detect vulnerabilities in generated data files during the running of application programs, thereby greatly reducing the impact of insecure data files on user information security. The threats it poses improve the security and practicality of the solution.
[0049] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of practice in sequences other than those illustrated or described herein. Furthermore, the terms "comprising" and "having", as well as any variations thereof, a...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com