Method and devices of submitting vulnerability information

A vulnerability and vulnerability management technology, which is applied in the field of submitting vulnerability information, can solve the problems of time-consuming and low efficiency, and achieve the effects of reducing time-consuming, improving efficiency, and avoiding low information accuracy

Inactive Publication Date: 2017-11-21
网易有道信息技术(北京)有限公司
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] For this reason, there is a great need for an improved method and device for submitting vulnerability information, so as to solve the time-consuming and low-efficiency defects in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and devices of submitting vulnerability information
  • Method and devices of submitting vulnerability information
  • Method and devices of submitting vulnerability information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The principle and spirit of the present invention will be described below with reference to several exemplary embodiments. It should be understood that these embodiments are given only to enable those skilled in the art to better understand and implement the present invention, rather than to limit the scope of the present invention in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.

[0065] Those skilled in the art know that the embodiments of the present invention can be implemented as a system, device, device, method or computer program product. Therefore, the present disclosure may be embodied in the form of complete hardware, complete software (including firmware, resident software, microcode, etc.), or a combination of hardware and software.

[0066] Herein, any number of elements in the drawings is used for illustration rather than...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

In the embodiment of the invention, a method of submitting vulnerability information is provided. The method includes: acquiring information of a test step and a test environment, where vulnerability of a first application program is located when the vulnerability occurs, by a second application program when the vulnerability is detected in a process of testing the first application program; and sending the test step information and the test environment information to a vulnerability management server by the second application program. In the solution, when the vulnerability is detected in the process of testing the first application program, the second application program acquires the information of the test step and the test environment where the vulnerability is located when the vulnerability occurs, and sends the same to the vulnerability management server, completely manual participation in the process by a tester is not needed, thus time consumed for submitting the vulnerability information can be reduced, and the efficiency can be improved; and at the same time, because operation is not completely manually carried out by the tester, the defect that submitted information is lower in accuracy and imperfect due to manual mistakes can also be avoided.

Description

technical field [0001] Embodiments of the present invention relate to the technical field of application program testing, and more specifically, embodiments of the present invention relate to a method and device for submitting vulnerability information. Background technique [0002] This section is intended to provide a background or context for implementations of the invention that are recited in the claims. The descriptions herein are not admitted to be prior art by inclusion in this section. [0003] In an era when smart terminals are becoming more and more common, more and more applications are installed in the smart terminals, and the frequency of people using the applications is gradually increasing. Due to the continuous improvement of users' requirements on the types and functions of APPs, in order to meet the different needs of users, developers have developed applications with different functions. After the application program is developed and before it is releas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36
Inventor 刘哲韩大伟
Owner 网易有道信息技术(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products