A vulnerability scanning repair system and method based on Oval

A vulnerability scanning and vulnerability repairing technology, applied in the field of information security, can solve problems such as low vulnerability defense efficiency, and achieve the effect of improving vulnerability defense efficiency

Inactive Publication Date: 2018-12-14
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] An Oval-based vulnerability scanning and repairing system and method are provided in the embodime

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A vulnerability scanning repair system and method based on Oval
  • A vulnerability scanning repair system and method based on Oval
  • A vulnerability scanning repair system and method based on Oval

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to enable those skilled in the art to better understand the technical solutions in the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described The embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0035] See figure 1 , Is a schematic structural diagram of an Oval-based vulnerability scanning and repairing system provided by an embodiment of the present invention, such as figure 1 As shown, the Oval-based vulnerability scanning and repairing system provided by the embodiment of the present invention includes: Oval...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a vulnerability scanning and repairing system and method based on Oval, and the system includes an Oval knowledge base, an Oval parsing module, a vulnerability scanning module, and a vulnerability repairing module. The Oval knowledge base, the vulnerability scanning module and the vulnerability repairing module are connected to the a vulnerability parsingmodule, wherein, the Oval knowledge base is used for storing vulnerability definition, vulnerability scanning definition and vulnerability repairing definition; the vulnerability scanning module is used to scan the vulnerability of the tested object. The vulnerability repair module is used to repair the scanned vulnerabilities. The vulnerability parsing module is used to send vulnerability definitions and vulnerability scanning definitions to the vulnerability scanning module and to send vulnerability repair definitions to the vulnerability repair module according to the vulnerability. The invention can pre-repair the leak in an active state before the leak occurs, and the leak prevention efficiency is improved.

Description

Technical field [0001] The invention relates to the technical field of information security, in particular to a vulnerability scanning and repairing system and method based on Oval. Background technique [0002] With the development of information technology, the security of data is increasingly valued by all walks of life. According to Gartner Research, approximately 70% of security attacks are at the application layer, that is, most security risks are due to operating system software and application software Caused by existing loopholes. [0003] Most of the existing treatment methods for system vulnerabilities are solved by installing update patches. For example, the vulnerability scan and repair of Tencent Manager is the patch update scan library. First, scan whether the corresponding patch is installed in the system. If the specified patch is not installed, then The user prompts that there is a specified vulnerability, and the repair of the vulnerability is to complete the vu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 唐洪英
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products