Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal system vulnerability scanning method and apparatus

A vulnerability scanning and terminal system technology, which is applied in the field of system security, can solve problems such as time investment, adverse effects on terminal equipment user information security, and vulnerabilities not patched in time

Active Publication Date: 2017-12-01
360 TECH GRP CO LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the unfixed length of the manufacturer's maintenance system or third-party application cycle, maintenance needs to invest time and cost, etc., there may be loopholes in the currently used system or third-party applications that are not patched in time for repair or there is no updated version to solve the existing version Vulnerabilities and other issues
This makes the terminal equipment unsafe for a period of time, and has a negative impact on the information security of terminal equipment users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal system vulnerability scanning method and apparatus
  • Terminal system vulnerability scanning method and apparatus
  • Terminal system vulnerability scanning method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0023] figure 1 A flow chart of a terminal system vulnerability scanning method according to an embodiment of the present invention is shown. Such as figure 1 As shown, the terminal system vulnerability scanning method specifically includes the following steps:

[0024] Step S101, acquiring context information required for vulnerability scanning.

[0025] There may be various vulnerabilities in the terminal system, and each vuln...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a terminal system vulnerability scanning method and apparatus. The method comprises the steps of obtaining context information required for vulnerability scanning; according to the context information, initializing an environment and files required for vulnerability scanning; starting a vulnerability scanning process to perform the vulnerability scanning on a terminal system until all vulnerabilities of the terminal system are scanned; and summarizing results obtained by the vulnerability scanning to obtain vulnerability scanning result information. The corresponding context information is obtained only according to scanning requirements, logic and the like corresponding to different vulnerability scanning, and the vulnerabilities of the terminal system can be scanned without applying for and obtaining any special right such as a root right and special resources. After all the vulnerabilities of the terminal system are scanned, the results obtained by the vulnerability scanning are summarized to obtain the vulnerability scanning result information, so that current security level of the terminal system is known.

Description

technical field [0001] The invention relates to the technical field of system security, in particular to a terminal system vulnerability scanning method and device. Background technique [0002] The system of the terminal device includes a system layer for supporting system operation and application layers of multiple third-party applications installed on the system layer. Different applications or systems may be provided by different vendors. Due to the unfixed length of the manufacturer's maintenance system or third-party application cycle, maintenance needs to invest time and cost, etc., there may be loopholes in the currently used system or third-party applications that are not patched in time for repair or there is no updated version to solve the existing version bugs etc. In this way, the terminal equipment may be unsafe for a period of time, which will adversely affect the information security of the terminal equipment user. [0003] Therefore, there is a need for ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 杨文林龚广陈豪
Owner 360 TECH GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products