Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability detection method and device

A vulnerability detection and vulnerability technology, applied in the computer field, can solve problems such as incompatibility of vulnerability detection methods, and achieve the effect of improving efficiency

Active Publication Date: 2021-07-20
STATE GRID BEIJING ELECTRIC POWER +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a vulnerability detection method and device to at least solve the technical problem that the vulnerability detection method is incompatible due to different operating systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and device
  • Vulnerability detection method and device
  • Vulnerability detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0021] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a loophole detection method and device. Wherein, the method includes: obtaining the system identifier of the operating system where the application client is located; determining the server identifier of the target proxy server matching the system identifier according to a preset mapping relationship, wherein the preset mapping relationship is used to store the system identifier and Correspondence between server identifiers; sending the data packet generated by the application client to the target proxy server, wherein the target proxy server is used to perform vulnerability detection on the data packet. The invention solves the technical problem that the vulnerability detection methods are not compatible due to different operating systems.

Description

technical field [0001] The present invention relates to the field of computers, in particular to a method and device for detecting vulnerabilities. Background technique [0002] In the prior art, mobile applications mainly run on two operating systems, one is Android. Android is a free and open source operating system based on Linux, mainly used in mobile devices, such as smartphones and tablets, led and developed by Google and the Open Handset Alliance. Among the mobile terminal platforms, Android has a considerable market share, and has been more and more widely used and recognized. One is iOS, which is a mobile operating system developed by Apple Inc. and belongs to the Unix-like commercial operating system. [0003] However, since the Android system and the IOS system are two different operating systems, when performing vulnerability detection on an application program, it is necessary to configure a corresponding vulnerability detection method according to the operati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08G06F21/57
CPCH04L63/1433G06F21/577H04L67/56
Inventor 王超任天宇李群王小虎师恩洁郭广鑫董佳涵
Owner STATE GRID BEIJING ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products