Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software vulnerability repair method and device for terminal

A software vulnerability and terminal technology, which is applied in the computer and security fields, can solve problems such as hindering vulnerability repair work, incompatibility with various Android devices, user security threats, etc.

Active Publication Date: 2020-06-26
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF16 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, due to the fragmentation of the Android system, there are more and more Android device types and system versions, and the existing vulnerability repair methods cannot be compatible with various Android devices, resulting in higher and higher development costs, which seriously hinders the repair of the vulnerability. Users are facing potential security threats, and this repair method only focuses on repairing kernel layer vulnerabilities, and cannot dynamically repair Native layer, application framework layer, and application layer vulnerabilities. The repair process requires restarting the device to achieve hot repair.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software vulnerability repair method and device for terminal
  • Software vulnerability repair method and device for terminal
  • Software vulnerability repair method and device for terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0033] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0034] figure 1 Shown is an exemplary system architecture 100 to which embodiments of the method or apparatus for repairing software vulnerabilities of the present application can be applied.

[0035] Such as figure 1 As shown, the system architecture 100 may include termi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software vulnerability fixing method and device for a terminal. One embodiment of the method comprises the steps that a fixing file, sent by a server, of a software vulnerability is received, wherein the fixing file comprises a fixing code, positioning information and compatibility information, and the compatibility information is used for indicating information needing to be added to a predetermined position of the fixing code when compatibility processing is performed on the fixing code; a to-be-fixed position which is indicated by the positioning information and corresponds to the software vulnerability is determined; the information indicated by the compatibility information is searched for in the context of the to-be-fixed position, and / or prep-acquired system information of the terminal and a preset corresponding relation between the system information and the information indicated by the compatibility information are utilized to search for the information indicated by the compatibility information; the information found through search is added to the predetermined position of the fixing code to obtain a compatible code; and the software vulnerability is fixed through the compatible code. Through the embodiment, hot fixing compatible with software vulnerabilities of different equipment is realized, and therefore the security of terminal equipment is protected.

Description

technical field [0001] The present application relates to the field of computer technology, specifically to the field of security technology, and in particular to a method and device for repairing software bugs in terminals. Background technique [0002] Vulnerabilities are defects in the specific implementation of hardware, software, protocols or system security policies, which allow attackers to access or destroy the system without authorization. Software is often the result of negligence on the part of the developer when developing the software, or limitations of the programming language. [0003] Taking the Android system as an example, among the native Android vulnerabilities, the kernel layer vulnerabilities account for about 1 / 4, and the native method layer (Native) layer, application framework layer, and native applications account for about the remaining 3 / 4. The existing vulnerability repair method is mainly that different device manufacturers release the source c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06F9/455
CPCG06F9/45504G06F21/563G06F21/568G06F2221/033
Inventor 杨书范王桂明包沉浮张煜龙韦韬
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products